Custom cover image
Custom cover image

Resource optimization and security for cloud services / Kaiqi Xiong

By: Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Series: Networks and telecommunications seriesPublisher: London : ISTE Ltd, 2014Edition: Online-AusgDescription: Online-Ressource (1 online resource (xi, 194 pages.))ISBN:
  • 9781306473354
  • 1306473357
  • 9781118898765
Subject(s): Additional physical formats: 9781848215993 | 1306473101 | Druckausg.: 978-184-821-599-3 | Druckausg.:: Druckausg. DDC classification:
  • 004.67/82
  • 005.8
LOC classification:
  • QA76.585
Online resources: Summary: Cover -- Title Page -- Contents -- Preface -- Chapter 1. Introduction -- 1.1. Motivation -- 1.2. The problems -- 1.3. Summary of contributions -- 1.4. The organization of this book -- Chapter 2. Current Approaches for Resource Optimization and Security -- 2.1. Service availability -- 2.2. Trustworthiness -- 2.3. Performance -- 2.4. The resource optimization problem subject to an SLA -- 2.5. Public-key cryptography-based authentication -- Chapter 3. Single Class Customers -- 3.1. The percentile of response time -- 3.2. A resource optimization problem for service models with single-class customers -- 3.3. Approaches for the resource optimization -- 3.4. Numerical validations -- 3.5. The balanced condition -- 3.6. Services Performance Modeling and Analysis in a Simple Scenario of Cloud Computing -- 3.6.1. Overview -- 3.6.2. A computer service performance model -- 3.6.3. A numerical validation -- 3.6.4. Discussions -- 3.7. Concluding remarks -- Chapter 4. Multiple-Class Customers -- 4.1. The SLA performance metric in the case of multiple class customers -- 4.2. The resource optimization problem for multiple customer services -- 4.2.1. Resource optimization problem for multiple class customers -- 4.3. Approaches for resource optimization -- 4.3.1. The LSTs of response time distributions for two priority customers -- 4.3.2. Algorithms for the resource optimization problem -- 4.4. Numerical validations -- 4.5. Concluding remarks -- Chapter 5. A Trustworthy Service Model -- 5.1. The trust-based resource optimization problem -- 5.2. A framework for solving the trust-based resource provisioning problem -- 5.3. The calculation of SLA metrics -- 5.3.1. The trustworthiness of resource sites -- 5.3.2. The percentile response time -- 5.3.3. The service availability -- 5.4. An approach for solving the trust-based resource provisioning problem.PPN: PPN: 787518913Package identifier: Produktsigel: ZDB-26-MYL | BSZ-30-PQE-K1DLR | ZDB-30-PAD | ZDB-30-PQE
No physical items for this record

Powered by Koha