Beyond the clouds: How should next generation utility computing infrastructures be designed?

M Bertier, F Desprez, G Fedak, A Lebre… - … , Limitations and R&D …, 2014 - Springer
To accommodate the ever-increasing demand for Utility Computing (UC) resources while
taking into account both energy and economical issues, the current trend consists in building …

Improving users' isolation in IaaS: virtual machine placement with security constraints

E Caron, JR Cornabas - 2014 IEEE 7th International …, 2014 - ieeexplore.ieee.org
Nowadays, virtualization is used as the sole mechanism to isolate different users on Cloud
platforms. In this paper, we show that, due to improper virtualization of micro-architectural …

An autonomous cloud management system for in-depth security

A Bousquet, J Briffaut, C Toinard - 2014 IEEE 3rd International …, 2014 - ieeexplore.ieee.org
Security has been a major concern in computer sciences for a long time. However, the
definition and the enforcement of a complete security policy are difficult tasks, requiring deep …

Beyond The Cloud, How Should Next Generation Utility Computing Infrastructures Be Designed?

A Lebre, J Pastor, M Bertier, F Desprez… - 2013 - inria.hal.science
To accommodate the ever-increasing demand for Utility Computing (UC) resources, while
taking into account both energy and economical issues, the current trend consists in building …

Secured systems in Clouds with Model-Driven Orchestration

E Caron, A Lefray… - 2016 IEEE Conference …, 2016 - ieeexplore.ieee.org
As its complexity grows, securing a system is harder than it looks. Even with efficient security
mechanisms, their configuration remains a complex task. Indeed, the current practice is the …

Security for Virtualized Distributed Systems: from Modelization to Deployment

A Lefray - 2015 - theses.hal.science
This Thesis deals with security for virtualized distributed environments such as Clouds. In
these environments, a client can access resources or services (compute, storage, etc.) on …