A systematic review on cloud computing

F Durao, JFS Carvalho, A Fonseka… - The Journal of …, 2014 - Springer
Cloud computing is an ascending technology that has introduced a new paradigm by
rendering a rational computational model possible. It has changed the dynamics of IT …

A study of security vulnerabilities on docker hub

R Shu, X Gu, W Enck - Proceedings of the Seventh ACM on Conference …, 2017 - dl.acm.org
Docker containers have recently become a popular approach to provision multiple
applications over shared physical hosts in a more lightweight fashion than traditional virtual …

TrustCloud: A framework for accountability and trust in cloud computing

RKL Ko, P Jagadpramana, M Mowbray… - 2011 IEEE World …, 2011 - ieeexplore.ieee.org
The key barrier to widespread uptake of cloud computing is the lack of trust in clouds by
potential customers. While preventive controls for security and privacy are actively …

An exhaustive survey on security concerns and solutions at different components of virtualization

R Patil, C Modi - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Virtualization is a key enabler of various modern computing technologies. However, it brings
additional vulnerabilities that can be exploited to affect the availability, integrity, and …

AmazonIA: when elasticity snaps back

S Bugiel, S Nürnberger, T Pöppelmann… - Proceedings of the 18th …, 2011 - dl.acm.org
Cloud Computing is an emerging technology promising new business opportunities and
easy deployment of web services. Much has been written about the risks and benefits of …

After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across iaas cloud

S Zhang, X Zhang, X Ou - Proceedings of the 9th ACM symposium on …, 2014 - dl.acm.org
Infrastructure as a Service (IaaS) cloud has been attracting more and more customers as it
provides the highest level of flexibility by offering configurable virtual machines (VMs) and …

High quality photometric reconstruction using a depth camera

M Haque, A Chatterjee… - Proceedings of the IEEE …, 2014 - cv-foundation.org
In this paper we present a depth-guided photometric 3D reconstruction method that works
solely with a depth camera like the Kinect. Existing methods that fuse depth with normal …

A parallel algorithm for constructing binary decision diagrams

S Kimura, EM Clarke - Proceedings., 1990 IEEE International …, 1990 - ieeexplore.ieee.org
A parallel algorithm for constructing binary decision diagrams is described. The algorithms
treats binary decision graphs as minimal finite automata. The automation for a Boolean …

Applying security policies and service level agreement to IaaS service model to enhance security and transition

L Karadsheh - computers & security, 2012 - Elsevier
Over a decade ago, cloud computing became an important topic for small, medium and
large businesses alike. The new concept promises scalability, security, cost reduction …

End-to-end patch automation and integration

SA Baset, R Garg, A Gupta, H Huang… - US Patent …, 2015 - Google Patents
A method of automating patching of a computer system includes determining whether a
computer patch is available for a computer system of a customer, determining a patch …