دانلود پاورپوینت “ محاسبات شبکه ای ( Grid Computing ) ” در 20 اسلاید
دانلود پاورپوینت “ محاسبات شبکه ای ( Grid Computing ) ”
دانلود پاورپوینت “ محاسبات شبکه ای ( Grid Computing ) ” در 20 اسلاید
Empirical Evaluation of a Cloud Computing Information Security Governance
Framework
Volume 58, February 2015, Pages 44–57
Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina, Haralambos
Mouratidis
Abstract
Context: Cloud computing is a thriving paradigm that supports an efficient way to provide IT services
by introducing on-demand services and flexible computing resources. However, significant adoption
of cloud services is being hindered by security issues that are inherent to this new paradigm. In
previous work, we have proposed ISGcloud, a security governance framework to tackle cloud security
matters in a comprehensive manner whilst being aligned with an enterprise’s strategy.
Objective: Although a significant body of literature has started to build up related to security aspects
of cloud computing, the literature fails to report on evidence and real applications of security
governance frameworks designed for cloud computing environments. This paper introduces a detailed
application of ISGCloud into a real life case study of a Spanish public organisation, which utilizes a
cloud storage service in a critical security deployment.
Method: The empirical evaluation has followed a formal process, which includes the definition of
research questions previously to the framework’s application. We describe ISGcloud process and
attempt to answer these questions gathering results through direct observation and from interviews
with related personnel.
Results: The novelty of the paper is twofold: on the one hand, it presents one of the first applications,
in the literature, of a cloud security governance framework to a real-life case study along with an
empirical evaluation of the framework that proves its validity; on the other hand, it demonstrates the
usefulness of the framework and its impact to the organisation.
Conclusion: As discussed on the paper, the application of ISGCloud has resulted in the organisation
in question achieving its security governance objectives, minimizing the security risks of its storage
service and increasing security awareness among its users.
Keywords: information security governance, case study, cloud computing, security governance
framework, cloud lifecycle
538 صفحه
13 فصل
Hard Real Time Computing Systems, 2011, Springer
Contents
A GENERAL VIEW
BASIC CONCEPTS
APERIODIC TASK SCHEDULING
PERIODIC TASK SCHEDULING
FIXED-PRIORITY SERVERS
DYNAMIC PRIORITY SERVERS
RESOURCE ACCESS PROTOCOLS
LIMITED PREEMPTIVE SCHEDULING
HANDLING OVERLOAD CONDITIONS
KERNEL DESIGN ISSUES
APPLICATION DESIGN ISSUES
REAL-TIME OPERATING SYSTEMS AND
STANDARDS
SOLUTIONS TO THE EXERCISES
Volume 51, October 2015, Pages 87–97
Volunteer computing systems offer high computing power to the scientific communities to run large data intensive scientific workflows. However, these computing environments provide the best effort infrastructure to execute high performance jobs. This work aims to schedule scientific and data intensive workflows on hybrid of the volunteer computing system and Cloud resources to enhance the utilization of these environments and increase the percentage of workflow that meets the deadline. The proposed workflow scheduling system partitions a workflow into sub-workflows to minimize data dependencies among the sub-workflows. Then these sub-workflows are scheduled to distribute on volunteer resources according to the proximity of resources and the load balancing policy. The execution time of each sub-workflow on the selected volunteer resources is estimated in this phase. If any of the sub-workflows misses the sub-deadline due to the large waiting time, we consider re-scheduling of this sub-workflow into the public Cloud resources. This re-scheduling improves the system performance by increasing the percentage of workflows that meet the deadline. The proposed Cloud-aware data intensive scheduling algorithm increases the percentage of workflow that meet the deadline with a factor of 75% in average with respect to the execution of workflows on the volunteer resources.