Академический Документы
Профессиональный Документы
Культура Документы
I.
I NTRODUCTION
978-1-4673-7741-6/15
/15
$31.00 2015 IEEE
$31.00 2015 IEEE
DOI 10.1109/NCCA.2015.24
99
II.
BACKGROUND
III.
I MPLEMENTATION
100
(1)
101
R EFERENCES
[1]
[2]
[3]
[4]
[5]
of
Virtual
[6]
Resource
[7]
[8]
V.
[9]
[10]
C ONCLUSION
102
A. Celesti, F. Tusa, M. Villari, and A. Puliafito, Three-phase crosscloud federation model: The cloud sso authentication, in Advances
in Future Internet (AFIN), 2010 Second International Conference on.
Venice, Italy: IEEE, July 2010, pp. 94 101.
A. V. Nimkar and S. K. Ghosh, A security framework for
virtual resource management in horizontal iaas federation, in
Advanced Computing, Networking and Informatics- Volume 2, ser.
Smart Innovation, Systems and Technologies. Springer International
Publishing, 2014, vol. 28, pp. 241247. [Online]. Available:
http://dx.doi.org/10.1007/978-3-319-07350-7 27
A. V. Nimkar and S. K. Ghosh, A theoretical study on access control
model in federated systems, in Recent Trends in Computer Networks
and Distributed Systems Security, ser. Communications in Computer
and Information Science. Springer Berlin Heidelberg, 2014, vol. 420,
pp. 310321. [Online]. Available: http://dx.doi.org/10.1007/978-3-64254525-2 28
A. Celesti, F. Tusa, M. Villari, and A. Puliafito, How to enhance
cloud architectures to enable cross-federation, in Cloud Computing
(CLOUD), 2010 IEEE 3rd International Conference on. Miami, FL,
USA: IEEE, July 2010, pp. 337345.
Z. Zhang and X. Zhang, Realization of open cloud computing
federation based on mobile agent, in Intelligent Computing and
Intelligent Systems, 2009. ICIS 2009. IEEE International Conference
on, vol. 3. Shanghai, China: IEEE, Nov 2009, pp. 642646.
B. Rochwerger, D. Breitgand, E. Levy, A. Galis, K. Nagin, I. Llorente,
R. Montero, Y. Wolfsthal, E. Elmroth, J. Caceres, M. Ben-Yehuda,
W. Emmerich, and F. Galan, The reservoir model and architecture
for open federated cloud computing, IBM Journal of Research and
Development, vol. 53, no. 4, pp. 4:14:11, July 2009.
A. Amokrane, M. Zhani, R. Langar, R. Boutaba, and G. Pujolle,
Greenhead: Virtual data center embedding across distributed
infrastructures, Cloud Computing, IEEE Transactions on, vol. 1, no. 1,
pp. 3649, Jan 2013.
Web Services Federation 1.2, OASIS, May 2009. [Online].
Available:
http://docs.oasis-open.org/wsfed/federation/v1.2/os/wsfederation-1.2-spec-os.pdf
Shibboleth Architecture Protocols and Profiles, Sept. 2005. [Online].
Available: http://shibboleth. internet2.edu/docs/draft-mace-shibboletharch-protocols-latest.pdf
H. Vegge, Realizing secure multiparty computations, Masters
thesis, Norwegian University of Science and Technology, Faculty of
Information Technology, Mathematics and Electrical Engineering,
Department of Telematics, Sept. 2009. [Online]. Available:
http://www.diva-portal.org/smash/get/diva2:347815/FULLTEXT01.pdf