Distributed, application-level monitoring for heterogeneous clouds using stream processing

M Smit, B Simmons, M Litoiu - Future Generation Computer Systems, 2013 - Elsevier
As utility computing is widely deployed, organizations and researchers are turning to the
next generation of cloud systems: federating public clouds, integrating private and public …

Network-based secret communication in clouds: A survey

J Ullrich, T Zseby, J Fabini… - … communications surveys & …, 2017 - ieeexplore.ieee.org
The cloud concept promises computing as a utility. More and more functions are moved to
cloud environments. But this transition comes at a cost: security and privacy solutions have …

Towards mitigation of low and slow application ddos attacks

M Shtern, R Sandel, M Litoiu, C Bachalo… - … conference on cloud …, 2014 - ieeexplore.ieee.org
Distributed Denial of Service attacks are a growing threat to organizations and, as defense
mechanisms are becoming more advanced, hackers are aiming at the application layer. For …

Hogna: A platform for self-adaptive applications in cloud environments

C Barna, H Ghanbari, M Litoiu… - 2015 IEEE/ACM 10th …, 2015 - ieeexplore.ieee.org
We propose Hogna, a platform for deploying self-managing web applications on cloud. The
platform enables the deployment of the applications based on the automation of a set of …

[PDF][PDF] Partitioning applications for hybrid and federated clouds.

M Smit, M Shtern, B Simmons, M Litoiu - CASCON, 2012 - Citeseer
On-demand access to computing resources asa-service has the potential to allow
enterprises to temporarily scale out of their private data center into the infrastructure of a …

Pattern-based deployment service for next generation clouds

H Lu, M Shtern, B Simmons, M Smit… - 2013 IEEE Ninth World …, 2013 - ieeexplore.ieee.org
This paper presents a flexible deployment service for cloud computing. The service
facilitates the specification and the execution of cloud deployment plans for applications. An …

Interoperability in the heterogeneous cloud environment: a survey of recent user-centric approaches

I Mansour, R Sahandi, K Cooper… - Proceedings of the …, 2016 - dl.acm.org
Cloud computing provides users the ability to access shared, online computing resources.
However, providers often offer their own proprietary applications, interfaces, APIs and …

[PDF][PDF] Openstack cloud security vulnerabilities from inside and outside

S Ristov, M Gusev, A Donevski - Cloud Computing, 2013 - personales.upv.es
As usage of cloud computing increases, customers are mainly concerned about choosing
cloud infrastructure with sufficient security. Concerns are greater in the multitenant …

Anomaly detection model based on hadoop platform and weka interface

B Cui, S He - 2016 10th International Conference on Innovative …, 2016 - ieeexplore.ieee.org
Anomaly detection is playing an increasingly important role in network security, and the
ability to detect and process anomalies for big data in real-time is a difficult task. In this …

An efficient QoS framework for cloud brokerage services

M Usha, J Akilandeswari… - … Symposium on Cloud and …, 2012 - ieeexplore.ieee.org
Cloud computing is the rapidly evolving area that offers the potential for federal agencies of
all the sizes to increase flexibility and efficiency. A cloud broker acts as an intermediary …