CLOUD COMPUTING AUDIT
|
|
|
- Randolph Gilbert
- 10 years ago
- Views:
Transcription
1 U.P.B. Sc. Bull., Seres C, Vol. 77, Iss. 3, 2015 ISSN CLOUD COMPUTING AUDIT Georgana MATEESCU 1, Valentn SGÂRCIU 2 Ths paper presents a personal approach of conductng the audt process n cloud archtecture. Startng from the cloud computng benefts, we presented n Introducton secton the man characterstcs that a cloud provder should offer to hs consumer n exchange for credblty and trust. In order to prove all these capabltes, a proper audt process must be mplemented. Secton 2 descrbes our orgnal methodology of evaluatng the safety level of a cloud servce and the complance level aganst the standards used as reference. Our personal contrbutons consstng n quantfyng the safety level based on assumed rsk level were valdated by the mplementaton depcted n secton three. Ths paper concludes wth the benefts of our methodology. Keywords: cloud computng governance, cloud audt, cloud strategy, cloud evaluaton 1. Introducton Cloud Computng s a very fashonable concept and n the same tme, a controversal one. Whle a lot of people refer t as a dsruptve technology that has the potental to enhance collaboraton, aglty, scalng, and avalablty, and provdes the opportuntes for cost reducton through optmzed and effcent computng [1], there are a lot of opnons that thnk cloud computng s a trap for users to become cloud provder dependent [2]. The man attrbutes of cloud computng phenomenon are [3]: Shared resources cloud computng s an archtecture that allows multple users to utlze the same resources from network level, host level to applcaton level. Massve scalablty cloud computng has the ablty to scale to thousands of systems. Elastcty n cloud computng framework t s very easy to adapt the resources hardware and software to the user s necessty. Pay as you go users pay only the resources they use for only the tme they actually requre them. 1 PhD Student, Faculty of Automatc Control and Computers, Unversty POLITEHNICA of Bucharest, Romana, e-mal: [email protected] 2 Professor, Faculty of Automatc Control and Computers, Unversty POLITEHNICA of Bucharest, Romana
2 32 Georgana Mateescu, Valentn Sgârcu Self provsonng of resources addtonal systems (processng capablty, software, storage) and network resources are added f needed. Cloud Computng represents a new archtectural model that lead to new governance and management strateges based on the trust between consumers and provders. The trust t s defned by the level of securty confdence a provder can offer to hs clents, confdence that must ensure the followng key factors [4]: Transparency n provng a hgh level of securty measures mplementaton that assures the proper use of confdental data durng ther entre lfecycle: create, share, use, archve, destroy stages. Prvacy the cloud servces must prevent, detect and react to securty breaches and malcous attacks n a tmely and effectve manner. Complance the cloud provder must prove complance wth the securty standards and regulatons. One of the most mportant aspects regardng ths topc s to ensure that the cloud consumer s able to retreve hs data from the cloud whenever s requred. Localzaton of data the physcal locaton of the data storage can be the subject of partcular regulaton s some geographc area, therefore the consumer must ensure proper cloud provder selecton f hs actvty s n scope for such standards. In order to prove that the cloud servce s complant wth technology and securty requrements, a proper audt process must be conduct. In ths paper, we present our personal approach n defnng an effectve audt methodology, able to quantfy the cloud servce safety and complance based on the key drvers from the man areas concernng the IT nfrastructure: governance, management, operatons. Startng from the COBIT [5] framework we have created an orgnal approach to evaluate the safety of a cloud servce n order to emphasze the man areas where enhancements are requred. The next secton descrbes the cloud audt methodology together wth the evaluaton algorthm. The thrd secton presents the practcal mplementaton for methodology valdaton. Ths paper concludes wth the man advantages and benefts of the presented approach. 2. Cloud Audt Process The Cloud Audt s a relatvely young doman that s beng enhanced by the cloud practces and standardzaton communtes n order to address all partcular ssues of the knd of archtectural model. The current practce, started from the IT tradtonal securty and control measures are based on these, the audt process s beng contnuously customzed on the cloud specfc partculartes. In order to create ths approach, we started from the exstng prncples, best practces and recommendatons regardng audt process, we mapped the tradtonal archtectures wth the cloud models n order to defne the man
3 Cloud computng audt 33 vertcals for the cloud audt specfc characters and for all these vertcals we classfed them nto domans. The categorzaton was performed accordng to the securty reference model defned n [7]. For all the vertcals we defned controls able to measure them. After defnng the audt context and aspects to evaluate, we bult our evaluaton methodology based on COBIT [5] model that offers a framework used to assess the governance and the management of IT. The framework was ntally desgned on tradtonal archtecture, but t can be adapted to cloud archtectures also. The capablty model leveraged by our methodology s depcted n the pcture below: Fg 1: COBIT capablty model [5] In order to conduct the audt process, we structured the exstng IT key prncples [6], practces, mechansms, procedures and controls n 14 domans, accordng to [7]. The audt process addresses one cloud applcaton that s evaluated from one or multple securty domans perspectve [8] [9], by analyzng the mplementaton level of each control defned n the audt questonnare for that doman. The audt report conssts n two man drvers: The safety level ths represents the level of securty controls mplementatons as compared to the assumed rsk defned for the applcaton that s been evaluated. The complance level ths represents the percentage of the securty coverage n the analyzed domans as they are defned by CSA n [7].
4 34 Georgana Mateescu, Valentn Sgârcu In order to compute the Safety Level, the approach defnes the applcaton rsk as the uncertanty rate reported to the cloud vulnerabltes from the analyzed securty doman, materalzed n the mplementaton level of each control: AR n = cnsa + k =1 Where: AR s the applcaton rsk for the evaluated doman ( 5 s ) c (1) c NSA s the correcton rsk constant computed based on the exstng cloud communty experence. Its value s 0.01 and t s ntroduces for practcal reasons because there s no doman wth zero rsk. s k s the score of the mplementaton level for control k from the doman c A s the correcton constant appled to the rsk defned for the control. Ths constant depends on the ndustry the target belongs to, and on the senstvty level of the cloud servce. n s the number controls beng evaluated n the audt process For each cloud applcaton, there s an assumed level of rsk ranked from 1 to 3, defned by the IT strategy and management responsble team. Based on the assumed level of rsk, the assumed rsk s computed usng the followng expresson: ' AR = RL n c A (2) Where: AR ' s the assumed rsk for the evaluated doman RL s the rsk level defned by the management responsble team c A s the correcton constant appled to the rsk defned for the control. Ths constant depends on the ndustry the target belongs to, and on the senstvty level of the cloud servce. n s the number controls beng evaluated n the audt process Based on these two measures, the safety level s computed as: AR 5 n(1 c ) A ' = AR SL 100 5n (3) Where: SL s the safety level for the evaluated doman c A s the correcton constant appled to the rsk defned for the control. Ths constant depends on the ndustry the target belongs to, and on the senstvty level of the cloud servce. AR ' s the assumed rsk for the evaluated doman AR s the applcaton rsk for the evaluated doman k A
5 Cloud computng audt 35 n s the number controls beng evaluated n the audt process If the audt process s conducted for multple domans, the safety level s the arthmetc mean of the safety levels of the ndvdual domans: n SL SL = = 1 (4) n Where: SL s the safety level of the audt process SL s the safety level for the evaluated doman n s the number of domans n scope for the audt process. Based on the safety level and on the assumed rsk level, the Complance Level s computed usng the followng expresson: c 1+ ( 1) SL SLmn CL = ( SLmn + ) (5) 2 SLmn Where: CL s the complance level for the evaluated doman SL s the safety level for the evaluated doman n s the number of domans n scope for the audt process c s the complance factor that ensure that the complance level s zero f the mnmum safety level s not reached. Ths factor s computed usng the followng expresson: 1, SL < SLmn c = (5) 2, SL > SLmn SL mn s the mnmum safety level that must be obtaned by a doman n order to be complant and t s computed based on the assumed level of rsk: SL = 1 RL Where: SL mn s the mnmum safety level mn c c (6) RL s the assumed rsk level for the applcaton c c s the complance constant and ts value s 0.25 The complance level s the measure of the mplemented level of securty and governance measures, as compared to the best practces recommended by the standards used as references when we defned the audt framework. Therefore the two levels computed by our approach offer a realstc vew of the contracted cloud servce by analyzng the entre ntegraton context. Our approach analyzes both cloud provder and consumer controls n order to evaluate the level of performance, governance, rsk, management and operaton of the IT doman.
6 36 Georgana Mateescu, Valentn Sgârcu 3. Implementaton the audt process In order to valdate the proposed methodology we used the followng archtecture: Fg 2: Implementaton Archtecture The IT envronment components are: The Identty Management System n charge wth the management of the enterprse users and accounts n target systems. Ths system retreves denttes attrbutes from Drectory Server system and, based on defned busness rules, provsons the cloud servce through APIs calls. The communcaton between Identty Management and salesforce.com s authentcated and the nformaton flow s encrypted by the Securty Gateway. Identty Management s the system that manages the users and the roles wthn salesforce.com.. The Drectory Server system s the authortatve source of denttes attrbutes n the company and provdes all employees detals to Identty Management system. Identty Federaton and Sngle Sgn On system s the system n charge wth the authentcaton process wthn the company. The repostory for the dentty federaton s Drectory Server Securty Gateway s the system n charge wth the encrypton of data n moton nvolved n the ntegraton wth salesforce. Salesforce.com s the cloud servce that s been audt and has the followng characterstcs depcted by the Table 1 below.
7 Cloud computng audt 37 The audted applcaton characterstcs No Characterstc Value 1 Applcaton Name Salesforce.com 2 Senstve Applcaton No 3 Nvel de Rsc Asumat 2 4 Implementaton Program Salesforce 5 Cloud Servce Type SaaS 6 Cloud Model Cloud Publc Table 1 Durng the audt process we addressed 11 domans out of 14 because these were the most relevant ones: Governance and Enterprse Rsk Management [14] Tradtonal Securty, Busness Contnuty and Dsaster Recovery [13] Complance and Audt [18] Portablty and Interoperablty [17] Incdent Response, Notfcaton and Remedaton [13] Applcaton Securty [11] Encrypton and Key Management [18] Identty and Access Management[15] Vrtualzaton [16] Data Center Operatons [19] Informaton Management and Data Securty [12] Doman The table below depcts the audt results: Audt Results No of App Controls Rsk Assumed Rsk Safety Level Governance and Enterprse Rsk Management Tradtonal Securty, Busness Contnuty and Dsaster Recovery Complance and Audt Portablty and Interoperablty Incdent Response, Notfcaton and Remedaton Table 2
8 38 Georgana Mateescu, Valentn Sgârcu Doman No of Controls App Rsk Assumed Rsk Safety Level Applcaton Securty Encrypton and Key Management Identty and Access Management Vrtualzaton Data Center Operatons Informaton Management and Data Securty Total Number of Controls 262 Safety Level The followng pcture depcts the rato between the Applcaton Rsk computed durng the audt process and the Assumed rsk for the analyzed domans: Fg 3 Raton between Applcaton Rsk and Assumed Rsk The pcture shows that the domans where the audted applcaton rsk exceeded than the assumed rsk are: Incdent Response, Notfcaton and Remedaton Applcaton Securty Encrypton and Key Management
9 Cloud computng audt 39 For these domans, the company wll have to enhace the exstng controls n order to ensure that the rsk s addressed properly and the busness requrements regadng avalablty and audtablty are met. The pcture below depcts the comparson between the safety level computed durng the audt process for all n scope domans: Fg 4: Safety Levels The level of safety of the audted applcaton s SL = 97%. Consderng that the assumed level of rsk s RL = 2 and that the applcaton s not consdered senstve, the mnmum safety level that must be met n order for one doman to be complant s: SL 1 RL c 95% (7) mn = c = Based on the mnmum safety level, the conformty level s computed for each n scope doman and the results are presented n the pcture below: Fg 5: Conformty Levels for the analyzed domans We can conclude that 10 out of 11 analyzed domans are complant wth the best practces recommended by the standards used as references n the audt
10 40 Georgana Mateescu, Valentn Sgârcu approach. The only doman that was not complant s Portablty and Interoperablty whch safety level s 94.62%. Ths means that the efforts for performng the enhancement requred for complance are not sgnfcant as the dfference untl the mnmum safety level n very small. The mean complance level for the 10 complant domans s: 10 CL = 1 CL = 100 = 97.7% (8) 10 We can conclude that the audted servce cloud s a safe servce, wth the safety level of 97% that proves the hgh performance securty and control mechansms n place n order to ensure transparency, prvacy, avalablty and requred performance. In the archtecture we audt, the salesforce.com was complant n 10 domans out of 11, fact that leads to a 90.9% percentage of complance. As already mentoned, the dfference between the safety level on the non-complant doman and the mnmum safety level requred for complance s small, therefore the overall evaluaton of salesforce.com s classfyng ths servce as a safe, controllable and hgh performance cloud servce. By mplementng ths use case we proved the practcal applcablty of our approach n evaluatng the cloud servce form the followng perspectves: Securty controls n place n the archtecture on both costumer and provder sde Governance and rsk management measures Operablty processes and procedures 6. Conclusons Nowadays the nformaton securty and proftablty are maybe the most mportant two aspects wthn an organzaton. They are nterconnected and have a drect mpact one on each other and because of that the man challenge today s to fnd the best balance between the cost spent on the securty aspects and ther proftablty. In order to ensure the maxmzed busness value added by mplementng IT programs, the companes must buld a strong audt process able to quantfy the safety of the IT soluton mplemented, the proftablty rate and the IT strategy maturty. By combnng techncal aspects [10] dved nto man securty drvers wth governance and operatons related factors, we managed to offer a full evaluaton analyss of cloud system that quantfes the overall safety of the cloud safety from both technologcal and operatonal perspectve. In ths way, the audt process can be a key decson support for the IT strategy roadmap.
11 Cloud computng audt 41 Our approach offers the followng benefts and nnovatons: Quantfes the safety score based on securty measures and controls usng an orgnal methodology based on mature and relable framework. Quantfes the level of complance wth the standards used as reference n defnng the audt framework. The approach reles of the safety score and t s bult by adaptng the tradtonal methodology to cloud archtectures. Offers an effcent methodology for complex analyss that shows strengths and weaknesses of the company Offers decson support for future cloud adopton by evaluatng the rate of company maturty and adaptablty to change by assessng the entre stack of mechansms, controls, process and procedures defned wthn the company n order to obtan an effcent governance and management process. By usng as a reference model an nternatonal standard, we ensure that the prncpals, best practces and mature recommendatons are part of the audt process. Also, by leveragng an exstng framework for ntal assessment of the mplementaton level, we obtan all the benefts of a framework that proved ts value durng the experence. We can conclude that our approach helps the company gan vsblty on ther own IT envronment by evaluatng the governance, management and operatons maturty levels usng a holstc approach. R E F E R E N C E S [1] Cloud Securty Allance, Securty Gudance for Crtcal Areas of Focus n Cloud Computng v [2] Mchael Armbrust, Armando Fox, Rean Grffth, Anthony D. Joseph, Randy Katz, Andy Konwnsk, Gunho Lee, Davd Patterson, Arel Rabkn, Ion Stoca, and Mate Zahara, Above the Clouds: A Berkeley Vew of Cloud Computng Electrcal Engneerng and Computer Scences Unversty of Calforna at Berkeley Techncal Report February 10, 2009 [3] Tm Mather, Subra Kumaraswany, Shahed Latf, Cloud Securty and Prvacy. An Enterprse Perspectve on Rsk and Complance, O Relly Unted States of Amerca, frst verson 2009 [4] Robert R. Moeller, Executve's Gude to IT Governance: Improvng Systems Processes wth Servce Management, COBIT, and ITIL, 2013 John Wnley & Sons ISBN: [5] ISACA, COBIT 5: A Busness Framework for the Governance and Management of Enterprse IT, 2012, ISACA ISBN: [6] ISACA, IT Control Objectves for Cloud Computng: Controls and Assurance n the Cloud, 2011, ISACA ISBN: [7] Cloud Securty Allance, Securty Gudance for crtcal areas of focus n cloud computng v3.0, [8] Robert R. Moeller, Executve's Gude to IT Governance: Improvng Systems Processes wth Servce Management, COBIT, and ITIL, 2013 John Wnley & Sons ISBN:
12 42 Georgana Mateescu, Valentn Sgârcu [9] Jared Carstensen, Bernard Golden, JP Morgenthal, Cloud Computng: Assessng the Rsks, 2012, IT Governance ISBN: [10] Chrs Davs, Mke Schller, Kevn Wheeler, IT Audtng: Usng Controls to Protect Informaton Assets, Second Edton, 2011 McGraw-Hll/Osborne ISBN: [11] Lee Newcombe, Securng Cloud Servces: A Pragmatc Approach to Securty Archtecture n the Cloud, 2012, IT Governance ISBN: [12] Jennfer L. Bayuk,Cyber Securty Polcy Gudebook, 2012, John Wley & Sons ISBN: [13] Kurt J. Engemann and Douglas M. Henderson, Busness Contnuty and Rsk Management: Essentals of Organzatonal Reslence, 2012, Rothsten Assocates ISBN: [14] Robert R. Moeller, COSO Enterprse Rsk Management: Establshng Effectve Governance, Rsk, and Complance, Second Edton, 2011, John Wley & Sons ISBN: [15] Matthew Metheny, Federal Cloud Computng: The Defntve Gude for Cloud Servce Provders, 2013, Syngress Publshng ISBN: [16] Dane Barrett and Greg Kpper, Vrtualzaton and Forenscs: A Dgtal Forensc Investgator's Gude to Vrtual Envronments, 2010 Syngress Publshng ISBN: [17] Nck Antonopoulos, Lee Gllam, Cloud Computng: Prncples, Systems and Applcatons, 2010, Sprnger ISBN: [18] Ben Halpert, Audtng Cloud Computng: A Securty and Prvacy Gude, 2011, John Wley & Sons ISBN: [19] Bran J.S. Chee, Curts Frankln, Cloud Computng: Technologes and Strateges of the Ubqutous Data Center, 2010, Auerbach Publcatons ISBN:
Multiple-Period Attribution: Residuals and Compounding
Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens
iavenue iavenue i i i iavenue iavenue iavenue
Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both
IT09 - Identity Management Policy
IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
Study on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
One Click.. Ȯne Location.. Ȯne Portal...
New Addton to your NJ-HITEC Membershp! Member Portal Detals & Features Insde! One Clck.. Ȯne Locaton.. Ȯne Portal... Connect...Share...Smplfy Health IT Member Portal Benefts Trusted Advsor - NJ-HITEC s
A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña
Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION
To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.
Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:
Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment
Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.
Getting It Together Project & Implementation Management
Gettng It Together Project & Implementaton Management CFE NETWORKING November 30, 2011 Fnancng NFA Fshng Best Practces Tranng & Mentorng Marketng & Brandng Governance Markets Fsh Legal Regulaton ? HR
CONTENTS Introduction... 3
Cuty ourm c r os of t Ex c hangeser v er s t or agec os t sbyupt o85% Howema lar c h v ngs ol ut onsex pand y ournat v eema lappl c at on' sc apab l t es CONTENTS Introducton... 3 Emal Storage Management...
Watermark-based Provable Data Possession for Multimedia File in Cloud Storage
Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U
SQUARE Project: Cost/Benefit Analysis Framework for Information Security Improvement Projects in Small Companies
SQUARE Project: Cost/Beneft Analyss Framework for Informaton Securty Improvement Projects n Small Companes System Qualty Requrements Engneerng (SQUARE) Team Nck (Nng) Xe Nancy R. Mead, Advsor Contrbutors:
Enterprise Content Management
Enterprse Content Management for the Laboratory Jm Mller Drector of Informatcs and Software Aglent Technologes Branden Humphrey Global Data Archve Program Manager Pfzer Global Research The content exploson
Network Security Situation Evaluation Method for Distributed Denial of Service
Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,
Overview of monitoring and evaluation
540 Toolkt to Combat Traffckng n Persons Tool 10.1 Overvew of montorng and evaluaton Overvew Ths tool brefly descrbes both montorng and evaluaton, and the dstncton between the two. What s montorng? Montorng
Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications
Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and
IMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION
NEURO-FUZZY INFERENE SYSTEM FOR E-OMMERE WEBSITE EVALUATION Huan Lu, School of Software, Harbn Unversty of Scence and Technology, Harbn, hna Faculty of Appled Mathematcs and omputer Scence, Belarusan State
Computer-assisted Auditing for High- Volume Medical Coding
Computer-asssted Audtng for Hgh-Volume Medcal Codng Computer-asssted Audtng for Hgh- Volume Medcal Codng by Danel T. Henze, PhD; Peter Feller, MS; Jerry McCorkle, BA; and Mark Morsch, MS Abstract The volume
Adobe Security Training
Adobe Securty Tranng Whte Paper Adobe Securty Tranng Table of Contents 1 Adobe Securty 1 The Adobe Securty Organzaton 2 Adobe Secure Product Development 3 ASSET Software Securty Certfcaton Program 5 Securty
Introduction CONTENT. - Whitepaper -
OneCl oud ForAl l YourCr t c al Bus nes sappl c at ons Bl uew r esol ut ons www. bl uew r e. c o. uk Introducton Bluewre Cloud s a fully customsable IaaS cloud platform desgned for organsatons who want
Scalable and Secure Architecture for Digital Content Distribution
Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel
A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS
METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng
Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
LIFETIME INCOME OPTIONS
LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com
Complex Service Provisioning in Collaborative Cloud Markets
Melane Sebenhaar, Ulrch Lampe, Tm Lehrg, Sebastan Zöller, Stefan Schulte, Ralf Stenmetz: Complex Servce Provsonng n Collaboratve Cloud Markets. In: W. Abramowcz et al. (Eds.): Proceedngs of the 4th European
M-applications Development using High Performance Project Management Techniques
M-applcatons Development usng Hgh Performance Project Management Technques PAUL POCATILU, MARIUS VETRICI Economc Informatcs Department Academy of Economc Studes 6 Pata Romana, Sector, Bucharest ROMANIA
National Security Agency Information Assurance Directorate
Natonal Securty Agency Informaton Assurance Drectorate Net-Centrc Enterprse Servces (NCES) Profle of Web Servce Securty: Smple Object Access Protocol (SOAP) Message Securty (WSSE) 02 MAY 2008 Prepared
Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
A Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
Capacity-building and training
92 Toolkt to Combat Traffckng n Persons Tool 2.14 Capacty-buldng and tranng Overvew Ths tool provdes references to tranng programmes and materals. For more tranng materals, refer also to Tool 9.18. Capacty-buldng
Small pots lump sum payment instruction
For customers Small pots lump sum payment nstructon Please read these notes before completng ths nstructon About ths nstructon Use ths nstructon f you re an ndvdual wth Aegon Retrement Choces Self Invested
Efficient Project Portfolio as a tool for Enterprise Risk Management
Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse
An Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
Canon NTSC Help Desk Documentation
Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent
Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
An Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
Design and Development of a Security Evaluation Platform Based on International Standards
Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School
A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing
A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure
Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno
Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December
Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School
Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management
Resource Management and Organization in CROWN Grid
Resource Management and Organzaton n CROWN Grd Jnpeng Hua, Tanyu Wo, Yunhao Lu Dept. of Computer Scence and Technology, Behang Unversty Dept. of Computer Scence, Hong Kong Unversty of Scence & Technology
Global innovative solutions You can rely on. www.calyon.com
Global nnovatve solutons You can rely on www.calyon.com CALYON has developed OPTIM SWIFTNet for ts clents. By provdng an extensve range of value-added servces, OPTIM SWIFTNet offers you worldwde connectons
A Dynamic Load Balancing for Massive Multiplayer Online Game Server
A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,
Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters
Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany [email protected],
LAW ENFORCEMENT TRAINING TOOLS. Training tools for law enforcement officials and the judiciary
chapter 5 Law enforcement and prosecuton 261 LAW ENFORCEMENT TRAINING TOOLS Tool 5.20 Tranng tools for law enforcement offcals and the judcary Overvew Ths tool recommends resources for tranng law enforcement
LITERATURE REVIEW: VARIOUS PRIORITY BASED TASK SCHEDULING ALGORITHMS IN CLOUD COMPUTING
LITERATURE REVIEW: VARIOUS PRIORITY BASED TASK SCHEDULING ALGORITHMS IN CLOUD COMPUTING 1 MS. POOJA.P.VASANI, 2 MR. NISHANT.S. SANGHANI 1 M.Tech. [Software Systems] Student, Patel College of Scence and
Politecnico di Torino. Porto Institutional Repository
Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve
Partner selection of cloud computing federation based on Markov chains
COMPUER MODELLING & NEW ECHNOLOGIES 2014 18(12B) 590-594 Abstract Partner selecton of cloud computng federaton based on Markov chans Lang Hong 1,2, Changyuan Gao 1* 1 School of Management, Harbn Unversty
Towards Specialization of the Contract-Aware Software Development Process
Towards Specalzaton of the Contract-Aware Software Development Process Anna Derezńska, Przemysław Ołtarzewsk Insttute of Computer Scence, Warsaw Unversty of Technology, Nowowejska 5/9, 00-665 Warsaw, Poland
A heuristic task deployment approach for load balancing
Xu Gaochao, Dong Yunmeng, Fu Xaodog, Dng Yan, Lu Peng, Zhao Ja Abstract A heurstc task deployment approach for load balancng Gaochao Xu, Yunmeng Dong, Xaodong Fu, Yan Dng, Peng Lu, Ja Zhao * College of
Vembu StoreGrid Windows Client Installation Guide
Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on
Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm
Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao
Electronic Document Management
tem no 14- THE CTY OF EDNBURGH COUNCL Electronc Document Management Executve of the Councl 7th October 2003 y. 1 1. 2 2.1 2.2 2.3 2.4 2.5 Purpose of report To approve a preferred suppler and proposed way
Load Balancing By Max-Min Algorithm in Private Cloud Environment
Internatonal Journal of Scence and Research (IJSR ISSN (Onlne: 2319-7064 Index Coperncus Value (2013: 6.14 Impact Factor (2013: 4.438 Load Balancng By Max-Mn Algorthm n Prvate Cloud Envronment S M S Suntharam
RequIn, a tool for fast web traffic inference
RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France [email protected], [email protected] Abstract As networked
Assessment of the legal framework
46 Toolkt to Combat Traffckng n Persons Tool 2.4 Assessment of the legal framework Overvew Ths tool offers gudelnes and resources for assessng a natonal legal framework. See also Tool 3.2 on crmnalzaton
Traffic-light a stress test for life insurance provisions
MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence
Calculating the high frequency transmission line parameters of power cables
< ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,
Can Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
Fair Virtual Bandwidth Allocation Model in Virtual Data Centers
Far Vrtual Bandwdth Allocaton Model n Vrtual Data Centers Yng Yuan, Cu-rong Wang, Cong Wang School of Informaton Scence and Engneerng ortheastern Unversty Shenyang, Chna School of Computer and Communcaton
Research on Transformation Engineering BOM into Manufacturing BOM Based on BOP
Appled Mechancs and Materals Vols 10-12 (2008) pp 99-103 Onlne avalable snce 2007/Dec/06 at wwwscentfcnet (2008) Trans Tech Publcatons, Swtzerland do:104028/wwwscentfcnet/amm10-1299 Research on Transformaton
The Load Balancing of Database Allocation in the Cloud
, March 3-5, 23, Hong Kong The Load Balancng of Database Allocaton n the Cloud Yu-lung Lo and Mn-Shan La Abstract Each database host n the cloud platform often has to servce more than one database applcaton
Cloud Auto-Scaling with Deadline and Budget Constraints
Prelmnary verson. Fnal verson appears In Proceedngs of 11th ACM/IEEE Internatonal Conference on Grd Computng (Grd 21). Oct 25-28, 21. Brussels, Belgum. Cloud Auto-Scalng wth Deadlne and Budget Constrants
Daily Mood Assessment based on Mobile Phone Sensing
2012 Nnth Internatonal Conference on Wearable and Implantable Body Sensor Networks Daly Mood Assessment based on Moble Phone Sensng Yuanchao Ma Bn Xu Yn Ba Guodong Sun Department of Computer Scence and
DBA-VM: Dynamic Bandwidth Allocator for Virtual Machines
DBA-VM: Dynamc Bandwdth Allocator for Vrtual Machnes Ahmed Amamou, Manel Bourguba, Kamel Haddadou and Guy Pujolle LIP6, Perre & Mare Cure Unversty, 4 Place Jusseu 755 Pars, France Gand SAS, 65 Boulevard
A Multi-Camera System on PC-Cluster for Real-time 3-D Tracking
The 23 rd Conference of the Mechancal Engneerng Network of Thaland November 4 7, 2009, Chang Ma A Mult-Camera System on PC-Cluster for Real-tme 3-D Trackng Vboon Sangveraphunsr*, Krtsana Uttamang, and
J. Parallel Distrib. Comput. Environment-conscious scheduling of HPC applications on distributed Cloud-oriented data centers
J. Parallel Dstrb. Comput. 71 (2011) 732 749 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. ournal homepage: www.elsever.com/locate/pdc Envronment-conscous schedulng of HPC applcatons
WhitePaper: Security "Point" Solutions are Not a 4 Letter Word:
Securty "Pont" Solutons are Not a 4 Letter Word: Why Purpose-Bult Solutons for Patch and Confguraton Management Contnue to be a Good Thng Securty "Pont" Solutons are Not a 4 Letter Word: In recent years
Mission Oriented Business Integration Services (MOBIS) FSC Group: 874 Class: R499
General Servces Admnstraton Federal Supply Servce Authorzed Federal Supply Schedule Prce Lst Msson Orented Busness Integraton Servces (MOBIS) FSC Group: 874 Class: R499 On-lne access to contract orderng
Fixed income risk attribution
5 Fxed ncome rsk attrbuton Chthra Krshnamurth RskMetrcs Group [email protected] We compare the rsk of the actve portfolo wth that of the benchmark and segment the dfference between the two
Selecting Best Employee of the Year Using Analytical Hierarchy Process
J. Basc. Appl. Sc. Res., 5(11)72-76, 2015 2015, TextRoad Publcaton ISSN 2090-4304 Journal of Basc and Appled Scentfc Research www.textroad.com Selectng Best Employee of the Year Usng Analytcal Herarchy
A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS
A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 [email protected]
Protection, assistance and human rights. Recommended Principles and Guidelines on Human Rights and Human Trafficking (E/2002/68/Add.
chapter 8 Vctm assstance 385 Tool 8.3 Protecton, assstance and human rghts Overvew Ths tool dscusses the human rghts consderatons whch must be borne n mnd n protectng and assstng vctms of traffckng. Recommended
PKIS: practical keyword index search on cloud datacenter
Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A
For example, you might want to capture security group membership changes. A quick web search may lead you to the 632 event.
Audtng Wndows & Actve Drectory Changes va Wndows Event Logs Ths document takes a lghtweght look at the steps and consderatons nvolved n settng up Wndows and/or Actve Drectory event log audtng. Settng up
E-learning Vendor Management Checklist
E-learning Vendor Management Checklist June 2008 Permission is granted to print freely, unmodified, this document from www.doingelearning.com or to copy it in electronic form. If linked to from the net
Estimating the Development Effort of Web Projects in Chile
Estmatng the Development Effort of Web Projects n Chle Sergo F. Ochoa Computer Scences Department Unversty of Chle (56 2) 678-4364 [email protected] M. Cecla Bastarrca Computer Scences Department Unversty
Improved SVM in Cloud Computing Information Mining
Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu
