رزفایل

مرجع دانلود فایل ,تحقیق , پروژه , پایان نامه , فایل فلش گوشی

رزفایل

مرجع دانلود فایل ,تحقیق , پروژه , پایان نامه , فایل فلش گوشی

دانلود مقاله Empirical evaluation of a cloud computing information security governance framework انتشار 2015

اختصاصی از رزفایل دانلود مقاله Empirical evaluation of a cloud computing information security governance framework انتشار 2015 دانلود با لینک مستقیم و پر سرعت .

دانلود مقاله Empirical evaluation of a cloud computing information security governance framework انتشار 2015


دانلود مقاله Empirical evaluation of a cloud computing information security governance framework انتشار 2015

Empirical Evaluation of a Cloud Computing Information Security Governance
Framework

 

Volume 58, February 2015, Pages 44–57

Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina, Haralambos
Mouratidis


Abstract
Context: Cloud computing is a thriving paradigm that supports an efficient way to provide IT services
by introducing on-demand services and flexible computing resources. However, significant adoption
of cloud services is being hindered by security issues that are inherent to this new paradigm. In
previous work, we have proposed ISGcloud, a security governance framework to tackle cloud security
matters in a comprehensive manner whilst being aligned with an enterprise’s strategy.
Objective: Although a significant body of literature has started to build up related to security aspects
of cloud computing, the literature fails to report on evidence and real applications of security
governance frameworks designed for cloud computing environments. This paper introduces a detailed
application of ISGCloud into a real life case study of a Spanish public organisation, which utilizes a
cloud storage service in a critical security deployment.
Method: The empirical evaluation has followed a formal process, which includes the definition of
research questions previously to the framework’s application. We describe ISGcloud process and
attempt to answer these questions gathering results through direct observation and from interviews
with related personnel.
Results: The novelty of the paper is twofold: on the one hand, it presents one of the first applications,
in the literature, of a cloud security governance framework to a real-life case study along with an
empirical evaluation of the framework that proves its validity; on the other hand, it demonstrates the
usefulness of the framework and its impact to the organisation.
Conclusion: As discussed on the paper, the application of ISGCloud has resulted in the organisation
in question achieving its security governance objectives, minimizing the security risks of its storage
service and increasing security awareness among its users.


Keywords: information security governance, case study, cloud computing, security governance
framework, cloud lifecycle


دانلود با لینک مستقیم


دانلود مقاله Empirical evaluation of a cloud computing information security governance framework انتشار 2015

Hard Real Time Computing Systems, 2011, Springer

اختصاصی از رزفایل Hard Real Time Computing Systems, 2011, Springer دانلود با لینک مستقیم و پر سرعت .

Hard Real Time Computing Systems, 2011, Springer


Hard Real Time Computing Systems, 2011, Springer

538 صفحه

13 فصل

Hard Real Time Computing Systems, 2011, Springer

Contents

A GENERAL VIEW

BASIC CONCEPTS

APERIODIC TASK SCHEDULING

PERIODIC TASK SCHEDULING

FIXED-PRIORITY SERVERS

DYNAMIC PRIORITY SERVERS

RESOURCE ACCESS PROTOCOLS

LIMITED PREEMPTIVE SCHEDULING

HANDLING OVERLOAD CONDITIONS

KERNEL DESIGN ISSUES

APPLICATION DESIGN ISSUES

REAL-TIME OPERATING SYSTEMS AND
STANDARDS

SOLUTIONS TO THE EXERCISES

 


دانلود با لینک مستقیم


Hard Real Time Computing Systems, 2011, Springer

دانلود مقاله Cloud-aware data intensive workflow scheduling on volunteer computing systems - انتشار 2015

اختصاصی از رزفایل دانلود مقاله Cloud-aware data intensive workflow scheduling on volunteer computing systems - انتشار 2015 دانلود با لینک مستقیم و پر سرعت .

دانلود مقاله Cloud-aware data intensive workflow scheduling on volunteer computing systems - انتشار 2015


دانلود مقاله Cloud-aware data intensive workflow scheduling on volunteer computing systems - انتشار 2015

Volume 51, October 2015, Pages 87–97

 

Abstract

Volunteer computing systems offer high computing power to the scientific communities to run large data intensive scientific workflows. However, these computing environments provide the best effort infrastructure to execute high performance jobs. This work aims to schedule scientific and data intensive workflows on hybrid of the volunteer computing system and Cloud resources to enhance the utilization of these environments and increase the percentage of workflow that meets the deadline. The proposed workflow scheduling system partitions a workflow into sub-workflows to minimize data dependencies among the sub-workflows. Then these sub-workflows are scheduled to distribute on volunteer resources according to the proximity of resources and the load balancing policy. The execution time of each sub-workflow on the selected volunteer resources is estimated in this phase. If any of the sub-workflows misses the sub-deadline due to the large waiting time, we consider re-scheduling of this sub-workflow into the public Cloud resources. This re-scheduling improves the system performance by increasing the percentage of workflows that meet the deadline. The proposed Cloud-aware data intensive scheduling algorithm increases the percentage of workflow that meet the deadline with a factor of 75% in average with respect to the execution of workflows on the volunteer resources.

 

Keywords

  • Volunteer computing;
  • Resource provisioning;
  • Data intensive workflow scheduling;
  • Cloud computing

دانلود با لینک مستقیم


دانلود مقاله Cloud-aware data intensive workflow scheduling on volunteer computing systems - انتشار 2015