myTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Managment

dc.conference.date20 - 24 August , 2012
dc.conference.placeHelsinki, Finland
dc.conference.titleWICSA/ECSA '12: Proceedings of the WICSA/ECSA 2012 Companion Volume
dc.contributor.authorWallom, David
dc.contributor.authorTurilli, Matteo
dc.contributor.authorMartin, Andrew
dc.contributor.authorRaun, Anbang
dc.contributor.authorTaylor, Gareth
dc.contributor.authorHargreaves, Nigel
dc.contributor.authorMcMoran, Alan
dc.contributor.rorhttps://ror.org/02jjdwm75
dc.date.accessioned2026-02-26T11:39:37Z
dc.date.issued2012-01-19
dc.description.abstractCloud Computing provides an optimal infrastructure to utilise and share both computational and data resources whilst allowing a pay-per-use model, useful to cost-effectively manage hardware investment or to maximise its utilisation. Cloud Computing also offers transitory access to scalable amounts of computational resources, something that is particularly important due to the time and financial constraints of many user communities. The growing number of communities that are adopting large public cloud resources such as Amazon Web Services [1] or Microsoft Azure [2] proves the success and hence usefulness of the Cloud Computing paradigm. Nonetheless, the typical use cases for public clouds involve non-business critical applications, particularly where issues around security of utilization of applications or deposited data within shared public services are binding requisites. In this paper, a use case is presented illustrating how the integration of Trusted Computing technologies into an available cloud infrastructure -- Eucalyptus -- allows the security-critical energy industry to exploit the flexibility and potential economical benefits of the Cloud Computing paradigm for their business-critical applications.
dc.description.peerreviewedYes
dc.description.statusPublished
dc.formatapplication/pdf
dc.identifier.citationWallom, D., Turilli, M., Martin, A., Raun, A., Taylor, G., Hargreaves, N., & McMoran, A. (2012). myTrustedCloud: trusted cloud infrastructure for security-critical computation and data management. In Proceedings of the WICSA/ECSA 2012 Companion Volume (pp. 82-83). https://doi.org/10.1109/CloudCom.2011.41
dc.identifier.doihttps://doi.org/10.1145/2361999.2362014
dc.identifier.officialurlhttps://ieeexplore.ieee.org/document/6133150
dc.identifier.urihttps://hdl.handle.net/20.500.14417/4155
dc.language.isoeng
dc.page.total8
dc.relation.departmentSci Tech (Data Science)
dc.relation.entityIE University
dc.relation.schoolIE School of Science & Technology
dc.rightsAttribution-ShareAlike 4.0 International
dc.rights.accessRightsinfo:eu-repo/semantics/openAccess
dc.rights.urihttp://creativecommons.org/licenses/by-sa/4.0/
dc.subject.keywordsCloud computing
dc.subject.keywordsData models
dc.subject.keywordsComputational modeling
dc.subject.keywordsKernel
dc.subject.keywordsServers
dc.subject.keywordsLoad modeling
dc.subject.odsODS 9 - Industria, innovación e infraestructura
dc.subject.unesco33 Ciencias Tecnológicas::3306 Ingeniería y tecnología eléctricas
dc.titlemyTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Managment
dc.typeinfo:eu-repo/semantics/conferenceObject
dc.version.typeinfo:eu-repo/semantics/acceptedVersion
dspace.entity.typePublication
relation.isAuthorOfPublication4c105a3d-3b6f-4801-b0a6-7593ef9017d2
relation.isAuthorOfPublication.latestForDiscovery4c105a3d-3b6f-4801-b0a6-7593ef9017d2

Bloque original

Mostrando 1 - 1 de 1
Cargando...
Miniatura
Nombre:
myTrustedCloud.pdf
Tamaño:
604.6 KB
Formato:
Adobe Portable Document Format

Bloque de licencias

Mostrando 1 - 1 de 1
Cargando...
Miniatura
Nombre:
license.txt
Tamaño:
1.71 KB
Formato:
Item-specific license agreed to upon submission
Descripción: