2017
DOI: 10.1016/j.future.2016.06.035
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Cloud and Workflow Patterns for the Analysis of Composite Cloud Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0
1

Year Published

2017
2017
2019
2019

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 54 publications
(14 citation statements)
references
References 27 publications
0
13
0
1
Order By: Relevance
“…To address these issues, an analytical framework able to provide a mathematical foundation for optimizing or finding a trade-off between the (possibly conflicting) objectives involved in the optimization problems, that the Cloud and Fog Orchestrator have solved, will be useful [90].…”
Section: Prediction and Optimizationmentioning
confidence: 99%
“…To address these issues, an analytical framework able to provide a mathematical foundation for optimizing or finding a trade-off between the (possibly conflicting) objectives involved in the optimization problems, that the Cloud and Fog Orchestrator have solved, will be useful [90].…”
Section: Prediction and Optimizationmentioning
confidence: 99%
“…As evidenced by Coppolino et al [2], applications running in the untrusted cloud are exposed to well-known attacks, which have been around for years but that gained prominence again because of the large adoption of cloud computing. These include attacks aiming at violating: i) availability by, e.g., flooding targeted machines (Denial of Service (1)); ii) data confidentiality/integrity by, e.g., altering communication channels [21] (Traffic Hijacking (2)) or landing on the system to subsequently launch an attack (Account Hijacking (3)). Besides these, the taxonomy considers other attacks, which in turn are typical of the cloud universe.…”
Section: Threats In a Cloud Environmentmentioning
confidence: 99%
“…As an example, homomorphic encryption has already been used as a key-tool in the popularization of electronic-based voting scheme. There are various application contexts in which this paradigm can be employed: private searching, keyword search, private storage, anonymous authentication, etc [19]. During the years, three types of HE algorithms were proposed:…”
Section: Introductionmentioning
confidence: 99%
“…These technologies are also interesting considering the possible application of cloud algorithms, allowing better distribution of computation complexity over the network, reducing load while increasing service opportunities for the nodes [3,4,5].…”
Section: Introductionmentioning
confidence: 99%