Committee login






Small thumbnail

Baidu SEO

Challenges and Intricacies of Marketing in China

Small thumbnail

Asymmetric Alliances and Information Systems

Issues and Prospects

Small thumbnail

Technicity vs Scientificity

Complementarities and Rivalries

Small thumbnail

Freshwater Fishes

250 Million Years of Evolutionary History

Small thumbnail

Biostatistics and Computer-based Analysis of Health Data using SAS

Biostatistics and Health Science Set

Small thumbnail

Predictive Control

Small thumbnail

Fundamentals of Advanced Mathematics 1

Categories, Algebraic Structures, Linear and Homological Algebra

Small thumbnail

Swelling Concrete in Dams and Hydraulic Structures

DSC 2017

Small thumbnail

The Chemostat

Mathematical Theory of Microorganims Cultures

Small thumbnail

Earthquake Occurrence

Short- and Long-term Models and their Validation

Small thumbnail

Resource Optimization and Security for Cloud Services

Kaiqi Xiong, Rochester Institute of Technology, USA

ISBN: 9781848215993

Publication Date: January 2014   Hardback   208 pp.

110.00 USD

Add to cart


Ebook Ebook


Resource Optimization and Security for Cloud Services covers the current state of the art in this field. It includes a study of trustworthiness, percentile response time, service availability, and network authentication for cloud services.
The first part of the book gives an analysis of percentile response time, which is one of the most important service level agreement (SLA) metrics. With the number of e-business applications dramatically increasing, SLA will play an important part in distributed and cloud service computing. An SLA is a combination of several Quality of Service (QoS) metrics, such as security, performance and availability, agreed upon between a customer and a service provider. Effective and accurate numerical solutions for the calculation of the percentile response time in single-class and multi-class queuing networks are presented. Then, the numerical solution is incorporated into a resource allocation problem. In the second part of the book, the author extends the approach to considering trustworthiness, service availability, and the percentile of response time in Web services. Finally, the third part presents a thorough performance evaluation of two notable public cryptography-based authentication techniques.
This is a useful reference book for researchers and engineers working and studying in the fields of distributed computing, cloud computing, service computing, networks and telecommunications, and network security.


1. Introduction.
2. Current Approaches for Resource Optimization and Security.
3. Single Class Customers.
4. Multiple-Class Customers.
5. A Trustworthy Service Model.
6. Performance Analysis of Public-Key Cryptography-Based Group Authentication.
7. Summary and Future Work.

About the Authors

Kaiqi Xiong is currently researching and teaching in the Department of Computing Security at Rochester Institute of Technology, USA. He has published more than 60 refereed journal and conference papers including over 25 refereed leading journal papers, over 35 refereed leading conference proceedings, and two IBM patents in computer networks.


DownloadTables of Contents - PDF File - 30 Kb

Related Titles

0.14031 s.