Hashizume, 2011 - Google Patents
A Reference Architecture for Cloud Computing and Its SecurityHashizume, 2011
- Document ID
- 17682800840874485263
- Author
- Hashizume K
- Publication year
- Publication venue
- Computing
External Links
- 238000003860 storage 0 abstract description 45
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
- G06F9/5072—Grid computing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/1002—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers, e.g. load balancing
- H04L67/1031—Controlling of the operation of servers by a load balancer, e.g. adding or removing servers that serve requests
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5005—Allocation of resources, e.g. of the central processing unit [CPU] to service a request
- G06F9/5027—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
- G06F9/5055—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals considering software capabilities, i.e. software resources associated or available to the machine
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hashizume et al. | An analysis of security issues for cloud computing | |
Gholami et al. | Security and privacy of sensitive data in cloud computing: a survey of recent developments | |
Almorsy et al. | An analysis of the cloud computing security problem | |
Yu et al. | Cloud computing and security challenges | |
Subashini et al. | A survey on security issues in service delivery models of cloud computing | |
Iqbal et al. | Service delivery models of cloud computing: security issues and open challenges | |
Yeluri et al. | Building the Infrastructure for Cloud Security: A Solutions View | |
Bouayad et al. | Cloud computing: Security challenges | |
US12204642B2 (en) | Hardware-based protection of application programming interface (API) keys | |
Will et al. | Intel software guard extensions applications: A survey | |
Soares et al. | Cloud security: state of the art | |
Mishra et al. | Cloud security: attacks, techniques, tools, and challenges | |
Boneder | Evaluation and comparison of the security offerings of the big three cloud service providers Amazon Web Services, Microsoft Azure and Google Cloud Platform | |
Pramod et al. | Limitations and challenges in cloud-based applications development | |
Gholami | Security and privacy of sensitive data in cloud computing | |
Bouchaala et al. | End to end cloud computing architecture based on a novel classification of security issues | |
Sood | Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks | |
Anupa et al. | Cloud workflow and security: A survey | |
Hashizume | A reference architecture for cloud computing and its security applications | |
Banks et al. | Trusted geolocation in the cloud: Proof of concept implementation (Draft) | |
Udayakumar | Design and deploy security for infrastructure, data, and applications | |
Hashizume | A Reference Architecture for Cloud Computing and Its Security | |
Liu et al. | T-YUN: Trustworthiness verification and audit on the cloud providers | |
Reza Memarian et al. | Applications of trusted computing in cloud context | |
Yeluri et al. | Boundary control in the cloud: geo-tagging and asset tagging |