DOI: 10.25148/etd.fidc007652
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Workload Allocation Approaches for Quality of Service Guarantee and Cybersecurity Risk Management

Abstract: The mathematical programming formulation of the VM allocation problems. 6.5 Finding the optimal VM allocation strategy using Nash Equilibrium (NE) general search algorithms .

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 112 publications
(315 reference statements)
0
1
0
Order By: Relevance
“…The very characteristic which made the cloud attractive, economical computation, stood to directly suffer in spite of the most effective countermeasures. Hardware changes that would eliminate the co-location attacks cannot be implemented immediately [14], are costly [15] [16], and difficult to implement. The alternative was to eliminate the co-residence necessary for a side channel attack [17].…”
Section: Security Models In the Cloudmentioning
confidence: 99%
“…The very characteristic which made the cloud attractive, economical computation, stood to directly suffer in spite of the most effective countermeasures. Hardware changes that would eliminate the co-location attacks cannot be implemented immediately [14], are costly [15] [16], and difficult to implement. The alternative was to eliminate the co-residence necessary for a side channel attack [17].…”
Section: Security Models In the Cloudmentioning
confidence: 99%