• Nem Talált Eredményt

JANUARY/FEBRUARY 2015

N/A
N/A
Protected

Academic year: 2022

Ossza meg "JANUARY/FEBRUARY 2015"

Copied!
3
0
0

Teljes szövegt

(1)

JANUARY/FEBRUARY 2015

www.computer.org/cloudcomputing

(2)

CONTENT

FEATURED ARTICLES

22 Interoperable Data

Management Using Personal and Infrastructure Clouds

Attila Kertesz

30 Traffi c-Aware Resource Provisioning for Distributed Clouds

Dan Xu, Xin Liu, and Athanasios V. Vasilakos

40 Recent Trends in Energy-Effi cient Cloud Computing

Toni Mastelic and Ivona Brandic

48 New Software Engineering Requirements in Clouds and Large-Scale Systems

Lutz Schubert and Keith Jeffery

60 Cloud Adoption in Malaysia:

Trends, Opportunities, and Challenges

Saeid Abolfazli, Zohreh Sanaei, Ali Tabassi, Steven Rosen, Abdullah Gani, and Samee U. Khan

22

What will the future of cloud computing look like? What are some of the issues

professionals, practitioners, and researchers need to address when utilizing cloud

services? IEEE Cloud Computing magazine serves as a forum for the constantly

shifting cloud landscape, bringing you original research, best practices, in-depth

analysis, and timely columns from luminaries in the fi eld.

(3)

Reuse Rights and Reprint Permissions: Educational or personal use of this material is permitted without fee, provided such use: 1) is not made for profit; 2) includes this notice and a full citation to the original work on the first page of the copy; and 3) does not imply IEEE endorsement of any third-party products or services. Authors and their companies are permitted to post the accepted version of their IEEE-copyrighted material on their own Web servers without permission, provided that the IEEE copyright notice and a full citation to the origin al work appear on the first screen of the posted copy. An accepted manu- script is a version which has been revised by the author to incorporate review suggestions, but not the published version with copyediting, proofreading and formatting added by IEEE. For more information, please go to: http://www.ieee.org/publications_standards/publications/rights/paperversionpolicy.html.

Permission to reprint/republish this material for commercial, advertising, or promotional purposes or for creating new collective works for resale or redistribu- tion must be obtained from the IEEE by writing to the IEEE Intellectual Property Rights Office, 445 Hoes Lane, Piscataway, NJ 08854-4141 or pubs-permissions

@ieee.org. Copyright © 2015 IEEE. All rights reserved.

Abstracting and Library Use: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy for private use of patrons, provided the per-copy fee indicated in the code at the bottom of the first page is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923.

IEEE prohibits discrimination, harassment, and bullying. For more information, visit www.ieee.org/web/aboutus/whatis/policies/p9-26.html.

January/February 2015 Volume 2, Issue 1

www.computer.org/cloudcomputing

40

COLUMNS

4 News

In Brief

Lee Garber

8 From the Editor in Chief The Road Ahead

Mazin Yousif

10 Cloud Economics Cloud Pricing and Markets

Joe Weinman

14 Cloud and the Law Cloud Attack and Risk Assessment Taxonomy

Nina Viktoria Juliadotter and Kim-Kwang Raymond Choo

69 Cloud Tidbits

Is Amazon Becoming the New Cool Software Company for Developers?

David Bernstein

72 Standards Now

Cloud Standards News and Updates

Alan Sill

76 Blue Skies

Processing Distributed Internet of Things Data in Clouds

Lizhe Wang and Rajiv Ranjan

21 IEEE CS Information 39 Advertising Index

30

Hivatkozások

KAPCSOLÓDÓ DOKUMENTUMOK

Cloud Computing for Computer and Data Intensive Applications (Cloud Computing). Integrated Monitoring Approach for Seamless

The cloud service model, or the cloud stack, includes Infrastructure-as-a-Service (IaaS - management and hosting of physical cloud elements such as computing, networking,

A related work on performance measurement compares high performance computing resources in cloud and physical environment, with and without utilizing the Docker software container

Therefore the main contributions of this paper are: (i) envisioning a solution for the data interoperability problem of cloud federations, (ii) the development of an image

Finally, in the fourth part, we show applications of cryptography for securing cloud services, focusing on secure cloud based data storage, and sharing first hand

c) Editor for cloud system models: Beside the risk patterns, a cloud system model is needed in which the risk patterns are searched for. The cloud system model can be a

His research interests include novel telecommunications paradigms, future networks and services, smart ubiquitous networking, context-aware networking, mobile cloud computing,

DreamFactory (DreamFactory, 2015) has many install guides for IaaS providers (Docker, Amazon Web Services, Microsoft Azure, Google Cloud Platform, VMware Marketplace, Bitnami