Committee login






Small thumbnail

Reliability Investigation of LED Devices for Public Light Applications

Durability, Robustness and Reliability of Photonic Devices Set

Small thumbnail

Aerospace Actuators 2

Signal-by-Wire and Power-by-Wire

Small thumbnail

Flash Memory Integration

Performance and Energy Considerations

Small thumbnail

Mechanics of Aeronautical Solids, Materials and Structures

Small thumbnail

Engineering Investment Process

Making Value Creation Repeatable

Small thumbnail

Space Strategy

Small thumbnail

Distributed Systems

Concurrency and Consistency

Small thumbnail

Fatigue of Textile and Short Fiber Reinforced Composites

Durability and Ageing of Organic Composite Materials Set Volume 1

Small thumbnail

Management of the Effects of Coastal Storms

Policy, Scientific and Historical Perspectives

Small thumbnail

Computational Color Science

Variational Retinex-like Methods

Small thumbnail

Resource Optimization and Security for Cloud Services

Kaiqi Xiong, Rochester Institute of Technology, USA

ISBN: 9781848215993

Publication Date: January 2014   Hardback   208 pp.

110.00 USD

Add to cart


Ebook Ebook


Resource Optimization and Security for Cloud Services covers the current state of the art in this field. It includes a study of trustworthiness, percentile response time, service availability, and network authentication for cloud services.
The first part of the book gives an analysis of percentile response time, which is one of the most important service level agreement (SLA) metrics. With the number of e-business applications dramatically increasing, SLA will play an important part in distributed and cloud service computing. An SLA is a combination of several Quality of Service (QoS) metrics, such as security, performance and availability, agreed upon between a customer and a service provider. Effective and accurate numerical solutions for the calculation of the percentile response time in single-class and multi-class queuing networks are presented. Then, the numerical solution is incorporated into a resource allocation problem. In the second part of the book, the author extends the approach to considering trustworthiness, service availability, and the percentile of response time in Web services. Finally, the third part presents a thorough performance evaluation of two notable public cryptography-based authentication techniques.
This is a useful reference book for researchers and engineers working and studying in the fields of distributed computing, cloud computing, service computing, networks and telecommunications, and network security.


1. Introduction.
2. Current Approaches for Resource Optimization and Security.
3. Single Class Customers.
4. Multiple-Class Customers.
5. A Trustworthy Service Model.
6. Performance Analysis of Public-Key Cryptography-Based Group Authentication.
7. Summary and Future Work.

About the Authors

Kaiqi Xiong is currently researching and teaching in the Department of Computing Security at Rochester Institute of Technology, USA. He has published more than 60 refereed journal and conference papers including over 25 refereed leading journal papers, over 35 refereed leading conference proceedings, and two IBM patents in computer networks.


DownloadTables of Contents - PDF File - 30 Kb

Related Titles

0.07652 s.