Usage Control in Cloud Systems
|
|
|
- Melissa Regina McDaniel
- 10 years ago
- Views:
Transcription
1 Usage Control in Cloud Systems Paolo Mori Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche Pisa Italy
2 Agenda Examples of usage of Cloud services Usage Control Model Policy Language Authorization system architecture Integration with OpenNebula and CONTRAIL Cloud Federation
3 Cloud Security Most of the well-known security issues of IT systems are still valid in the Cloud New security issues due to Cloud peculiarities Users Cloud services providers Reports on Cloud Security CSA NIST ENISA...
4 Examples of usage of IaaS Cloud A researcher creates a new Virtual Machine to manage the SVN of each new project he starts NESSoS project users create a new Virtual Machine on the NESSoS Cloud Execution Environment to develope their applications using NESSoS Eclipse development tools
5 Examples of usage of IaaS Cloud A researcher creates a new Virtual Machine to manage the SVN of each new project he starts 1 3 years NESSoS project users create a new Virtual Machine on the NESSoS Cloud Execution Environment to develope their applications using NESSoS Eclipse development tools 6 months g n i t s a es l g ss n lo cce a
6 Other examples of Cloud usage CONTRAIL project use cases: Distributed Provisioning of Geo-referentiated Data Multimedia Processing Service MarketPlace Real-Time Scientific Data Analysis Electronic Drug Discovery g n i t as es l g ss n lo cce a
7 IaaS Cloud Accesses IMG usage VM usage Time Start VM Create IMG Stop VM Delete IMG
8 Authorization of Long Lasting Accesses
9 Usage Control Model Defined by R. Sandhu et. al. The UCON Usage Control Model. ACM Trans. on Information and System Security, 7(1), 2004 Formal Model and Policy Specification of Usage Control. ACM Trans. on Information and System Security, 8(4), 2005 Towards a Usage-Based Security Framework for Collaborative Computing Systems. ACM Trans. on Information and System Security, 11(1), Main novelties New decision factors: Obligations and Conditions Mutability of Attributes Continuity of Policy Enforcement
10 Usage Control Model Defined by R. Sandhu et. al. The UCON Usage Control Model. ACM Trans. on Information and System Security, 7(1), 2004 Formal Model and Policy Specification of Usage Control. ACM Trans. on Information and System Security, 8(4), 2005 Towards a Usage-Based Security Framework for Collaborative Computing Systems. ACM Trans. on Information and System Security, 11(1), Main novelties New decision factors: Obligations and Conditions Mutability of Attributes Continuity of Policy Enforcement
11 Mutable Attributes Change their value frequently, as a consequence of the decision process Paired with users and resources Examples: Reputation of users: changes as a consequence of the accesses performed by the user Workload of systems: changes when new applications are started and when running applications are terminated
12 Continuity of Policy Enforcement The decisions process is done continuously (OnGoing decision) while the access right is exercised, and the access is interrupted when the right does not hold any more Examples: OnGoing Authorization: the right of accessing a resource is granted as long as the reputation of the user is GOOD. OnGoing Obligation: the right of accessing a resource is granted as long as the user keeps an advertisement window opened.
13 Access VS Usage Control Continuity of decision Decision Pre decision Access request Usage Ongoing decision end begin Before usage Usage After usage Mutability of attributes Attr. update Pre update Ongoing update Post update Time
14 Access VS Usage Control Traditional Access Control Continuity of decision Decision Pre decision Access request Usage Ongoing decision end begin Before usage Usage After usage Mutability of attributes Attr. update Pre update Ongoing update Post update Time
15 Access VS Usage Control Continuity of decision Decision Pre decision Access request Usage Ongoing decision revocation begin Before usage Usage After usage Mutability of attributes Attr. update Pre update Ongoing update Post update Time
16 Why Usage Control in Cloud? Accesses to some resources are long-lasting (hours, days,..) e.g., Virtual Machines in IaaS model The factors that granted the access when it was requested could change while the access is in progress User's reputation could decrease Workload of resources could change... The policy should be re-evaluated every time factors change An access that is in progress could be interrupted
17 Example of Usage Control Policies In natural language: Users with role RegisteredUser can run Virtual Machines as long as their reputation is equal or higher than GOOD Users with role Guest can run Virtual Machines as long as the overall workload is lower than HIGH and their reputation is equal to VERYGOOD
18 Security Policy Language
19 UCON XACML Security Policy Language XACML is a widely used standard for expressing security policies NIST recommends its use for authorization in Cloud We extended XACML to implement UCON features: Attributes update Continuous control Preliminary work: A proposal on enhancing XACML with continuous usage control features. CoreGrid ERCIM WG Workshop on Grids, P2P and Service Computing, 2009
20 Example of UCON-XACML policy
21 Usage Control System
22 XACML Reference Architecture Access Control System access req PEP PEP PEP permit/deny Context handler PDP PAP PIP
23 Usage Control System Extension of the XACML reference architecture to deal with continuous policy enforcement: PEPs intercept END of accesses (besides access requests) Session Manager (new component) keeps trace of accesses in progress PIP monitors mutable attributes Triggers the re-evaluation of the security policy PDP revokes ongoing accesses
24 Usage Control System Architecture Usage Control System Session Manager try access permit/deny PEP PEP PEP revoke access end access Context handler PDP PAP PIP
25 Prototypes 1)Extension of support authorization Resources: VMs 2)CONTRAIL project: integration with Cloud Federation manager Resources: applications (set of VMs running on distinct Cloud providers)
26 Integration with OpenNebula Usage Control System Authz Driver Session Manager PEP Core PEP Context handler Hook Manager PEP PDP PAP PIP
27 Design, implement, validate and promote an open source software stack for Cloud federations Develop a comprehensive Cloud platform integrating a full IaaS and PaaS offer Advanced SLA management Advanced security support Federated authentication Usage Control
28 Usage Control System Performance Ongoing accesses revocation resources per provider 5 resources per provider Time (ms) Number of providers
29 Papers A. Lazouski, G. Mancini F. Martinelli, P. Mori: Usage Control in Cloud Systems. In Procedings of The 3rd International workshop on Cloud Applications and Security (CAS 12), IEEE Computer Society (2012) A. Lazouski, F. Martinelli, P. Mori: A Prototype for Enforcing Usage Control Policies Based on XACML. In Proceedings of the 9th International Conference on Trust, Privacy and Security in Digital Business (TrustBus'12), LNCS 7449, Springer (2012) L. Krautsevich, A. Lazouski, F. Martinelli, P. Mori, A. Yautsiukhin: Integration of Quantitative Methods for Risk Evaluation within Usage Control Policies. In Procedings of International Conference on Computer Communications and Networks (ICCCN2013) (2013)
30 EU Projects Network of Excellence on Engineering Secure Future Internet Software Service and System Oct 2010 apr 2014 Open Computing Infrastructures for elastic Services Oct 2010 feb 2014 Confidential and Compliant Clouds Nov 2013 oct 2016
31 Thank you!! Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche Pisa Italy
32 UCON-XACML Policy Schema
PoS(ISGC 2012)019. The CONTRAIL approach to Cloud Federations. Massimo Coppola, Patrizio Dazzi. Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori
Massimo Coppola, Patrizio Dazzi Istituto di Scienza e Tecnologie dell Informazione Consiglio Nazionale delle Ricerche Pisa, Italy Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori Istituto di Informatica
QoS Resource Management for Cloud Federations
QoS Resource Management for Cloud Federations Gaetano F. Anastasi National Council of Research (CNR), Pisa, Italy Pisa, June 16th, 2014 [email protected] QoS Management for Cloud Federations
Access Control of Cloud Service Based on UCON
Access Control of Cloud Service Based on UCON Chen Danwei, Huang Xiuli, and Ren Xunyi Nanjing University of posts & Telecommunications, New Model Street No.66, 210003, Nanjing, China [email protected],
Parametric Attack Graph Construction and Analysis
Parametric Attack Graph Construction and Analysis Leanid Krautsevich Department of Computer Science, University of Pisa Largo Bruno Pontecorvo 3, Pisa 56127, Italy Istituto di Informatica e Telematica,
Cloud Federations in Contrail
Cloud Federations in Contrail Emanuele Carlini 1,3, Massimo Coppola 1, Patrizio Dazzi 1, Laura Ricci 1,2, GiacomoRighetti 1,2 " 1 - CNR - ISTI, Pisa, Italy" 2 - University of Pisa, C.S. Dept" 3 - IMT Lucca,
Private Cloud Database Consolidation with Exadata. Nitin Vengurlekar Technical Director/Cloud Evangelist
Private Cloud Database Consolidation with Exadata Nitin Vengurlekar Technical Director/Cloud Evangelist Agenda Private Cloud vs. Public Cloud Business Drivers for Private Cloud Database Architectures for
Access Control Framework of Personal Cloud based on XACML
Access Control Framework of Personal Cloud based on XACML 1 Jun-Young Park, 2 Young-Rok Shin, 3 Kyoung-Hun Kim, 4 Eui-Nam Huh 1First Author, 2 Kyung Hee University, {parkhans, shinyr}@khu.ac.kr 3 Gangdong
goberlin a Trusted Cloud Marketplace for Governmental and Commercial Services
goberlin a Trusted Cloud Marketplace for Governmental and Commercial Services Data Protection and Security Considerations in an egovernment Cloud in Germany Dr. Klaus-Peter Eckert Public Sector Cloud Forum
Toward a Usage-Based Security Framework for Collaborative Computing Systems
Toward a Usage-Based Security Framework for Collaborative Computing Systems XINWEN ZHANG Samsung Information Systems America MASAYUKI NAKAE NEC Corporation MICHAEL J. COVINGTON Intel Corporation and RAVI
Open Data Center Alliance Usage: Identity Management Interoperability Guide rev. 1.0
sm Open Data Center Alliance Usage: Identity Interoperability Guide rev. 1.0 Open Data Center Alliance Usage: Identity Interoperability Guide Rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary...
Dynamic Resource management with VM layer and Resource prediction algorithms in Cloud Architecture
Dynamic Resource management with VM layer and Resource prediction algorithms in Cloud Architecture 1 Shaik Fayaz, 2 Dr.V.N.Srinivasu, 3 Tata Venkateswarlu #1 M.Tech (CSE) from P.N.C & Vijai Institute of
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
Federated authorization for SaaS applications
Federated authorization for SaaS applications Maarten Decat, Bert Lagaisse, Wouter Joosen IBBT-DistriNet, KU Leuven, 3001 Leuven, Belgium Abstract. With Software-as-a-Service (SaaS), a centrally hosted
Cloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
21/09/11. Introduction to Cloud Computing. First: do not be scared! Request for contributors. ToDO list. Revision history
Request for contributors Introduction to Cloud Computing https://portal.futuregrid.org/contrib/cloud-computing-class by various contributors (see last slide) Hi and thanks for your contribution! If you
Cloud Computing Standards: Overview and ITU-T positioning
ITU Workshop on Cloud Computing (Tunis, Tunisia, 18-19 June 2012) Cloud Computing Standards: Overview and ITU-T positioning Dr France Telecom, Orange Labs Networks & Carriers / R&D Chairman ITU-T Working
Secure Identity in Cloud Computing
Secure Identity in Cloud Computing Michelle Carter The Aerospace Corporation March 20, 2013 The Aerospace Corporation 2013 All trademarks, service marks, and trade names are the property of their respective
A Runtime Monitoring Environment for Mobile Java
A Runtime Monitoring Environment for Mobile Java Fabio Martinelli Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche Pisa, Italy [email protected] Thomas Quillinan Vrije
Cloud Computing An Introduction
Cloud Computing An Introduction Distributed Systems Sistemi Distribuiti Andrea Omicini [email protected] Dipartimento di Informatica Scienza e Ingegneria (DISI) Alma Mater Studiorum Università di
Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken )
23.11.2015 Jan Philipp Manager, Cyber Risk Services Enterprise Architect Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken ) Purpose today Introduction» Who I am
An Introduction to Virtualization and Cloud Technologies to Support Grid Computing
New Paradigms: Clouds, Virtualization and Co. EGEE08, Istanbul, September 25, 2008 An Introduction to Virtualization and Cloud Technologies to Support Grid Computing Distributed Systems Architecture Research
Cloud deployment model and cost analysis in Multicloud
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 4, Issue 3 (Nov-Dec. 2012), PP 25-31 Cloud deployment model and cost analysis in Multicloud
Digital Policy Management Framework for Attribute-Based Access Control
Digital Policy Management Framework for Attribute-Based Access Control Contract Milestone Task 12.1 19 December 2014 The Johns Hopkins University Applied Physics Laboratory Table of Contents Executive
Extended RBAC Based Design and Implementation for a Secure Data Warehouse
Extended RBAC Based Design and Implementation for a Data Warehouse Dr. Bhavani Thuraisingham The University of Texas at Dallas [email protected] Srinivasan Iyer The University of Texas
A Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011
A Strawman Model NIST Cloud Computing Reference Architecture and Taxonomy Working Group January 3, 2011 Objective Our objective is to define a neutral architecture consistent with NIST definition of cloud
Work in Progress on Cloud Computing in Myriads Team and Contrail European Project Christine Morin, Inria
Potential collaboration talk Work in Progress on Cloud Computing in Myriads Team and Contrail European Project Christine Morin, Inria Design and implementation of autonomous distributed systems Internet
Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS) (ENCS 691K Chapter 4) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ References 1. R. Moreno et al.,
Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University
Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University What is cloud computing? What are some of the keywords? How many of you cannot
Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST
Future of Cloud Computing Irena Bojanova, Ph.D. UMUC, NIST No Longer On The Horizon Essential Characteristics On-demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service
Georgiana Macariu, Dana Petcu, CiprianCraciun, Silviu Panica, Marian Neagul eaustria Research Institute Timisoara, Romania
Open source API and platform for heterogeneous Cloud computing environments Georgiana Macariu, Dana Petcu, CiprianCraciun, Silviu Panica, Marian Neagul eaustria Research Institute Timisoara, Romania Problem
Cloud and Virtualization to Support Grid Infrastructures
ESAC GRID Workshop '08 ESAC, Villafranca del Castillo, Spain 11-12 December 2008 Cloud and Virtualization to Support Grid Infrastructures Distributed Systems Architecture Research Group Universidad Complutense
Software and Cloud Security
1 Lecture 12: Software and Cloud Security 2 Lecture 12 : Software and Cloud Security Subjects / Topics : 1. Standard ISO/OSI security services 2. Special problems, specific for software components and
ITU- T Focus Group Cloud Compu2ng
ITU- T Focus Group Cloud Compu2ng International Telecommunication Union 1 ITU-T FG Cloud Management & Structure Management team: Chairman: Victor Kutukov (Russia) Vice-Chairman: Jamil Chawki (France Telecom
Cloud Database Demystified to Deliver SaaS Customer Value
Cloud Database Demystified to Deliver SaaS Customer Value 2 The business of Cloud Savvis ranks as a leader Magic Quadrant for Cloud Infrastructure-as-a-Service and Web Hosting The Magic Quadrant is copyrighted
SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING
SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING 1. K.SURIYA Assistant professor Department of Computer Applications Dhanalakshmi Srinivasan College of Arts and Science for Womren Perambalur Mail: [email protected]
Permanent Link: http://espace.library.curtin.edu.au/r?func=dbin-jump-full&local_base=gen01-era02&object_id=154091
Citation: Alhamad, Mohammed and Dillon, Tharam S. and Wu, Chen and Chang, Elizabeth. 2010. Response time for cloud computing providers, in Kotsis, G. and Taniar, D. and Pardede, E. and Saleh, I. and Khalil,
Cloud Infrastructure Pattern
1 st LACCEI International Symposium on Software Architecture and Patterns (LACCEI-ISAP-MiniPLoP 2012), July 23-27, 2012, Panama City, Panama. Cloud Infrastructure Pattern Keiko Hashizume Florida Atlantic
Challenges for enabling Cloud
Scuola Superiore Sant Anna Challenges for enabling Cloud Computing over optical networks Piero Castoldi, Barbara Martini, Fabio Baroncelli Workshop Grid vs Cloud Computing and Why This Should Concern the
ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213
ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213 Application Compatibility Many organizations have business critical or internally
When Security, Privacy and Forensics Meet in the Cloud
When Security, Privacy and Forensics Meet in the Cloud Dr. Michaela Iorga, Senior Security Technical Lead for Cloud Computing Co-Chair, Cloud Security WG Co-Chair, Cloud Forensics Science WG March 26,
Proactively Secure Your Cloud Computing Platform
Proactively Secure Your Cloud Computing Platform Dr. Krutartha Patel Security Engineer 2010 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Agenda 1 Cloud
Cloud Computing Architectures and Design Issues
Cloud Computing Architectures and Design Issues Ozalp Babaoglu, Stefano Ferretti, Moreno Marzolla, Fabio Panzieri {babaoglu, sferrett, marzolla, panzieri}@cs.unibo.it Outline What is Cloud Computing? A
1. Introduction. 2. Background. 2.1. Cloud computing in a nutshell
Title: Towards new access control models for Cloud computing systems Category: 'In the Cloud' - Security Author name: Gouglidis Antonios City, Country: Thessaloniki, Greece Year of study, Course Title:
Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
Identity Security Using Authentication and Authorization in Cloud Computing
Identity Security Using Authentication and Authorization in Cloud Computing D.Ranjith #1, J.Srinivasan *2 # Department of Computer Science and Applications, Adhiparasakthi College of Arts and Science,Kalavai,Vellore-632506
Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security
Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities
IaaS Federation. Contrail project. IaaS Federation! Objectives and Challenges! & SLA management in Federations 5/23/11
Cloud Computing (IV) s and SPD Course 19-20/05/2011 Massimo Coppola IaaS! Objectives and Challenges! & management in s Adapted from two presentations! by Massimo Coppola (CNR) and Lorenzo Blasi (HP) Italy)!
An open source software tool for creating and managing patient consents electronically in IHE XDS.b environments
An open source software tool for creating and managing patient consents electronically in IHE XDS.b environments 20th of April 2012 O. Heinze 1, M. Birkle 1, H. Schmuhl 1, B. Bergh 1 1 Department of Information
journey to a hybrid cloud
journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
Cloud services in PL-Grid and EGI Infrastructures
1 Cloud services in PL-Grid and EGI Infrastructures J. Meizner, M. Radecki, M. Pawlik, T. Szepieniec ACK Cyfronet AGH Cracow Grid Workshop 2012, Kraków, 22.10.2012 Overview 2 Different types of Compute
Securing Storage as a Service Model of Cloud Computing using Client Authentication in Virtualized Environment
Securing Storage as a Service Model of Cloud Computing using Client Authentication in Virtualized Environment Maria Andleeb Siddiqui 1 and Hammad Kamal 2 Syed Abbas Ali 1 Lab Engineer, D.H.A Suffa Univeristy,
Accelerating Cloud adoption with Security Level Agreements automation, monitoring and industry standards compliance
Accelerating Cloud adoption with Security Level Agreements automation, monitoring and industry standards compliance Cirrus Workshop, Vienna, Austria, November 19, 2013 Dr. Said Tabet Senior Technologist
Auto-Scaling Model for Cloud Computing System
Auto-Scaling Model for Cloud Computing System Che-Lun Hung 1*, Yu-Chen Hu 2 and Kuan-Ching Li 3 1 Dept. of Computer Science & Communication Engineering, Providence University 2 Dept. of Computer Science
Cloud Computing and Software Agents: Towards Cloud Intelligent Services
Cloud Computing and Software Agents: Towards Cloud Intelligent Services Domenico Talia ICAR-CNR & University of Calabria Rende, Italy [email protected] Abstract Cloud computing systems provide large-scale
Cloud Computing from an Institutional Perspective
15th April 2010 e-infranet Workshop Louvain, Belgium Next Generation Data Center Summit Cloud Computing from an Institutional Perspective Distributed Systems Architecture Research Group Universidad Complutense
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
Cloud Computing with Azure PaaS for Educational Institutions
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 139-144 International Research Publications House http://www. irphouse.com /ijict.htm Cloud
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
EMI views on Cloud Computing
EMI views on Cloud Computing Florido Paganelli Lund University NorduGrid 2011, May 10th, Sundvolden, Norway Florido Paganelli (Lund University) EMI views on Cloud Computing NorduGrid2011 1 / 25 Outline
Performance Management for Cloudbased STC 2012
Performance Management for Cloudbased Applications STC 2012 1 Agenda Context Problem Statement Cloud Architecture Need for Performance in Cloud Performance Challenges in Cloud Generic IaaS / PaaS / SaaS
Inter-cloud Introduction. Yisheng Wang
Inter-cloud Introduction Yisheng Wang Agenda Introduction Summer Updates Future Work Introduction Cloud Introduction Cloud Federation Researches on Cloud Federation Conclusion Cloud Introduction Definition
Entitlements Access Management for Software Developers
Entitlements Access Management for Software Developers Market Environment The use of fine grained entitlements and obligations control for access to sensitive information and services in software applications
Environments, Services and Network Management for Green Clouds
Environments, Services and Network Management for Green Clouds Carlos Becker Westphall Networks and Management Laboratory Federal University of Santa Catarina MARCH 3RD, REUNION ISLAND IARIA GLOBENET 2012
SLA-driven Dynamic Resource Provisioning for Service Provider in Cloud Computing
IEEE Globecom 2013 Workshop on Cloud Computing Systems, Networks, and Applications SLA-driven Dynamic Resource Provisioning for Service Provider in Cloud Computing Yongyi Ran *, Jian Yang, Shuben Zhang,
Information Security Management System for Cloud Computing
ICT Innovations 2011 Web Proceedings ISSN 1857-7288 49 Information Security Management System for Cloud Computing Sashko Ristov, Marjan Gushev, and Magdalena Kostoska Ss. Cyril and Methodius University
Scientific Cloud Computing Infrastructure for Europe Strategic Plan. Bob Jones,
Scientific Cloud Computing Infrastructure for Europe Strategic Plan Bob Jones, IT department, CERN Origin of the initiative Conceived by ESA as a prospective for providing cloud services to space sector
Is ISO/IEC 15504 Applicable to Agile Methods?
Is ISO/IEC 15504 Applicable to Agile Methods? Giuseppe Lami 1, Fabio Falcini 2 1 Consiglio Nazionale delle Ricerche, Istituto di Scienza e Tecnologie dell Informazione via Moruzzi, 1 I-56124 Pisa, Italy
A Gentle Introduction to Cloud Computing
A Gentle Introduction to Cloud Computing Source: Wikipedia Platform Computing, Inc. Platform Clusters, Grids, Clouds, Whatever Computing The leader in managing large scale shared environments o 18 years
Introduction to Cloud Computing - 02
Introduction to Cloud Computing - 02 Iván Carrera Institute of Informatics - UFRGS September 2013 Outline Platform as a Service Characteristics PaaS Architecture - Problem* PaaS NIST Recommendations PaaS
