a
- Access control. See Attribute-based access control (ABAC) and Role-based access control (RBAC)
- Access patterns. See File access patterns
- ACID databases, 170
- Actor-Role-Coordinator (ARC) model, 242
- Actors (fine-grained units of computation), , 237, 239 –243, 246 –247, 250 –254, 258 –265, 268 –269, 271, 321
- coordinating, 259 –264
- synchronizers for coordinating, 260 –264
- Adaptive replication scheme, 140 –141
- Adobe, 295
- AFS, 151
- AGILE, 166
- AICPA. See American Institute of Certified Public Accountants (AICPA)
- Air Force Office of Scientific Research (AFOSR), 44, 160, 272
- Air Force Research Laboratory (AFRL), 44, 160, 272
- Air Force, U.S., , , 51 –52
- Albatross, 164, 166, 168
- Alerts, 104 –117
- automating the analysis of, 106 –107
- Amazon, 11, 16, 153, 175, 178, 318
- Amazon EC2 cloud, 56, 138
- Amazon Web Services (AWS), , 10, 12, 37 –40, 42, 186, 286
- Ambry, 134, 149, 152, 153, 317, 318
- American Association for Laboratory Accreditation, 287
- American Institute of Certified Public Accountants (AICPA), , 285, 288 –290, 296, 298
- Amoeba, 167, 206
- Apache Cassandra. See Cassandra
- Apache Hadoop, , , 32, 137, 138 –139, 141 –142, 144, 160, 161, 162, 163, 166, 167 –168, 197, 204 –223, 224, 317, 319, 320
- Apache Hadoop MapReduce. See MapReduce
- Apache HBase, 32
- Apache Storm, , 160, 161, 162, 165, 168, 185, 186, 187, 191 –197, 224, 319, 320
- Apache Storm Nimbus daemon, 191
- Apache ZooKeeper. See ZooKeeper
- ARIA, 168
- Arrival patterns, 134, 142 –144, 147, 317
- Assured Cloud Computing Center of Excellence (ACC-UCoE), , 15 –16
- Asynchronous session types, 243
- Asynchronous writes, 150, 152
- Attribute-based access control (ABAC), , 82, 118 –128, 316
- Aurora, 165
- Authorization language (for mobile hybrid clouds), 250 –254
- grouping, selection, and binding, 252
- policy description, 252 –253
- policy evaluation, 253 –254
- Authorization systems, 245 –247, 249 –250, 253 –254, 258
- hard policies, 249
- soft policies, 249
- Autonomous vehicles, 154, 319
- AutoScale, 166
b
- Bad neighbor effect, 53, 58
- Batch processing systems, , , 160 –162, 167 –168, 204 –223, 224, 319 –320
- Bayesian networks, , 106, 109 –118, 316
- decision support with, 114 –117
- BerkeleyDB database, 41
- Big data, 135, 161, 204
- Bing (Microsoft service), 139
- Bipartite matching, 162, 172 –174, 319 –320
- BlinkDB, 168
- Blobs (large sets of immutable data), 150 –152, 317
- Blue and gray networks, , 314
- Borealis, 165
- British Standard 7799, 291
- Bundesamt für Sicherheit in der Informationstechnik (BSI), 294
- Business considerations, , 52, 56, 123 –125, 168, 169, 278, 295
c
- C5. See Cloud Computing Compliance Control Catalogue (C5)
- Cache partitioning, 316
- Caching, 57, 95, 101, 141, 143, 145, 146, 147, 150, 151, 152, 167, 171, 177, 315
- Caffe, 321
- Cake, 168
- Canadian Institute of Chartered Accountants (CICA), 290
- CAP theorem, , 10
- Cassandra, , , 10, 15 –23, 26, 40 –42, 44, 160 –162, 164, 169, 170, 180, 183, 185, 200, 224, 313, 319, 320
- CCT Hadoop production cluster, 139
- CDRM, 141
- Centrifuge, 168
- Ceph, 151
- Certifications. See Standards
- Checkpointing, 94 –95, 162, 167 –168, 205, 208, 210 –214, 216, 217, 218, 320
- Chief Information Officers Council, U.S. (CIO Council), 286
- China, 293
- Chord, 200
- Chunk-based strategy, 99 –103, 162, 170 –179, 185, 319
- Churning, 142, 143, 145 –147, 317
- C-I-A (confidentiality, integrity, and availability), 279, 281 –282, 288, 289, 290, 292, 295, 297, 302, 304
- Civil War, U.S., 52
- CloneCloud, 241, 255
- Cloud application models, 244–247
- Cloud computing
- community (See Community cloud)
- definition, –
- future of, 43 –44, 78 –79, 128 –129, 153 –154, 224 –225, 271 –272, 302 –305, 312 –323
- general principles, 51, 277 –279
- growth of, 49, 278
- history of, –
- hybrid (See Hybrid cloud)
- military, –, 50 –54, 314
- nationalization of (hypothetical), 52
- NIST definition of,
- private (See Private cloud)
- public (See Public cloud)
- resilience, , 55, 81 –129
- Cloud Computing Compliance Control Catalogue (C5), 294
- Cloud Control Matrix (CCM), 294, 296, 299, 300, 301 –302
- Cloud file systems, 137 –152, 212, 317
- Cloudlet solutions, 154
- CloudScale, 166
- Cloud Security Alliance (CSA), 294, 296, 299, 302
- Cloud storage systems, –, –, 10 –44, 133 –154, 160 –166, 169 –185, 223, 312 –313, 317 –320
- Code offloading, 238 –241, , 43 –259
- to maximize performance, 255 –256
- to minimize energy consumption, 256 –257
- for parallel execution on hybrid clouds, 255
- performance- and energy-usage-based, 254 –259
- for sequential execution on a single server, 254 –255
- Community cloud, ,
- Competitive aging algorithm, 134, 138
- Compromised users, , 50, 55, 57 –79, 82
- identification of in shared computing infrastructures, 103 –118
- Conductor, 168
- Congestion, , 10, 162, 165, 178 –179, 187 –196, 320
- Consistency guarantees, , 11, 15 –17, 21, 30, 33, 41, 152, 183
- Consistent hashing, 17, 165, 180, 199, 200
- Containers, 207, 208, 209 –218, 221, 250 –252, 259, 316
- Contiguous Vertex Repartitioning (CVR), 198 –199, 201, 203 –204
- Coordination
- hierarchical model of, 241
- Coordination constraints, 238, 240, 241 –242, 265, 271, 321 –322
- Coq (higher-order theorem prover), 41
- Coresident attacks, 56 –57
- COS, 241
- CouchDB, 170
- Credential-stealing incidents. See Compromised users
- CRUD operations, 170, 171, 183
- CSA. See Cloud Security Alliance (CSA)
- CVE-2008-0600 vulnerability, 90 –91, 94 –95
d
- DARE algorithm, 137, 140 –141, 142, 317
- Data access patterns, 139 –144, 151
- Database reconfigurations. See Reconfiguration
- Data locality, 137, 138, 140 –141, 150, 167
- Data replication, 23, 31, 134, 137 –152, 317
- Deadline-based eviction, 206, 215 –216
- Deadlines. See Priorities
- Debian, 179
- Delay scheduling, 141 –142, 167
- Department of Defense, U.S. (DoD), 284, 286, 312
- Department of Homeland Security, U.S. (DHS), 286
- Design exploration, 12, 17, 37, 43
- Directors coordination model, 241
- Distributed file systems, –, 139, 151 –152, 212
- Distributed graph processing. See Graph processing
- Distributed storage systems, , 40, 133 –135, 146, 149 –152, 160 –162, 179 –185, 318, 319
- Distributed stream processing systems, , , 160, 162, 165, 185 –197, 224, 319, 320
- DOT, 204
- DryadLINQ, 168, 204
- Dual-priority settings, 205 –209, 216
- Dynamic process creation, 272, 322
- Dynamic proportional share scheduling, 168
- Dynamo, 180
- DynamoDB database, 37 –38, 42
e
- EC2. See Amazon EC2 cloud
- Edge computing, 153, 154, 312, 314
- Effective Throughput Percentage (ETP), 186 –191, 196 –197
- Elasticity, , , , 10, 51, 52, 53, 135 –136, 162, 165 –167, 186 –187, 192, 197 –198, 203, 243, 245 –247, 250, 256, 320, 321
- Elastisizer, 166
- ElephantTrap, 138, 141
- Emulab, 176, 178, 193, 206, 221
- Encryption, 32, 33, 244 –245, 247
- Energy management, 271, 321
- Energy monitoring, 246, 257 –259
- and security policies, 258 –259
- Enforcing use patterns, , 237 –272, 321 –322
- ETP. See Effective Throughput Percentage (ETP)
- Eventual consistency, , 11, 15, 17, 19 –21, 41 –42, 183
- Eviction policies, 163, 167 –168, 205 –210, 214 –223, 320
f
- Facebook, 17, 138, 139, 149, 152, 162, 197, 208, 318, 320
- Facial recognition application, 239, 247 –249, 251, 253
- Fair Scheduler. See Hadoop Fair Scheduler
- Fault/attack injectors, 12, 27, 38, 91, 93, 129, 315
- Federal Cloud Computing Initiative, 286
- Federal Information Security Management Act (FISMA), 285, 286, 287
- FedRAMP Authorization To Operate (ATO). See FedRAMP certification
- FedRAMP certification, , 277, 283 –288, 294, 296, 298 –303, 312, 322, 323
- FedRAMP Joint Authorization Board (JAB), 287
- FedRAMP Program Management Office (PMO), 287
- FedRAMP Third Party Assessment Organizations (3PAO), 287
- File access patterns, 137 –142, 144, 146, 148, 151, 317
- File sharing, 149, 318
- First-in, first-out (FIFO) scheduler, 137, 138, 141
- Formal methods, , 10, 12 –16, 23, 37 –40, 42, 44, 260, 312 –313
- Formal modeling, –, 10 –44, 86, 312 –313
- Formal pattern, 44
- Formal specification. See Formal modeling
- Future of cloud computing. See Cloud computing, Future of
g
- Game analysis, 61 –67
- Game model, 59 –61
- Game theory, , 49 –79, 313 –314
- Generally Accepted Privacy Principles (GAPP), 290
- General Services Administration (GSA), 286
- Geo-distributed storage, , –, 10, 133 –135, 149 –153, 318
- German Information Security Office. See Bundesamt für Sicherheit in der Informationstechnik (BSI)
- GFS, 139, 151
- GISMO, 147
- Global preemption, 167
- Global types, 242 –243, 264 –272, 322
- Google, , 10, 15, 23, 30, 136, 138, 139, 153, 164, 197, 318
- Google Cloud, 179
- Google Megastore. See Megastore (from Google)
- GPS, 167, 197, 258
- GraphLab, 166, 197
- Graph processing, , , 153, 160, 162, 163, 166 –167, 185, 197 –204, 224, 319 –320
- Greedy assignment, 172 –173, 174, 176, 200
- Greedy reactive schemes, 140
- Group key management, 16, 31 –37
h
- Hadoop. See Apache Hadoop
- Hadoop Capacity Scheduler, 168, 209 –210, 214, 216, 217 –218
- Hadoop Fair Scheduler, 137, 138, 141, 142, 168, 206, 217
- Hadoop Online, 168
- Hadoop YARN, 162, 163, 205, 206, 207, 209 –212, 320
- Hard cap (in Hadoop), 218
- Haystack, 152
- HDFS, 139, 140, 144, 146, 147, 151, 211, 212, 214, 217, 317
- Health applications, , 11, 38, 154, 169, 284, 295, 319
- Hedera, 164
- Heron (Twitter's stream processing system), 161, 165
- Heuristics, 54, 55, 139, 167, 199
- Hive, 204
- Hotelling's law, 69
- HP Labs, 146
- Hprobes, 85 –95, 315
- application heartbeat detector, 91 –93, 95
- emergency exploit detector, 90 –91, 94 –95
- event forwarder, 88, 89
- hprobe-based detector, 88 –89
- hprobe kernel agent, 88, 89
- performance evaluation, 93 –95
- Hungarian strategy, 173, 174, 176, 200
- Hybrid cloud, , , , 56, 238 –239, 244, 245, 247, 250, 253 –256, 258, 321
- Hypervisor Introspection (HI), , 96 –103, 315
- defenses against, 101 –103
- introducing noise to VM clocks, 101
- randomized monitoring interval, 102 –103
- scheduler-based defenses, 101 –102
- evading VMI with, 98 –100
- limitations, 98
- Hypervisor probes. See Hprobes
- Hypervisors, , 49 –50, 57 –79, 82, 83, 84 –103, 128, 278, 315, 316
i
- IBM, , , 17, 165, 187, 195
- IBM Infosphere. See Infosphere
- IBM System S, 165, 186
- Illinois Mobile Cloud Manager (IMCM), 238 –241, 243 –259
- Image (image-processing application), 239 –240, 247 –249, 251 –253
- IMCM. See Illinois Mobile Cloud Manager (IMCM)
- Inactive storage, 143
- Indexed names, overlapping nested, 272, 322
- India, 293
- Inferring use patterns, , 237 –272, 321 –322
- Infiltration. See Side-channels
- Information flow, , 237, 240, 321
- Information Security and Identity Management Committee (ISIMC), 286
- Infosphere, 168
- Infrastructure as a service (IaaS) model, , 98, 166, 278
- Intel, 84, 93 –94, 97, 316
- Interaction types, 242 –243, 265
- Interdependency, 50, 57, 58, 78, 82
- International Electrotechnical Commission (IEC), , 285, 291
- International Organization for Standardization (ISO), , 280, 285, 291
- IronFleet framework, 41
- ISO 17799, 291
- ISO/IEC 17020, 287
- ISO/IEC 17021, 292
- ISO/IEC 27001 certification, , 277, 285, 286, 291 –292, 294, 302 –303, 322 –323
- ISO/IEC 27002, 291
- ISO/IEC 27006, 292
k
- Key encrypting key (KEK), 32 –33
- Key-value storage/databases, , 15, 17 –18, 21, 41, 44, 146, 152, 161, 162, 168 –185, 224, 319, 320
- KVM hypervisor, 58, 88 –89, 93, 94, 97
l
- Lamport, Leslie, 37, 40
- Lang-A (programming language), 265, 268 –270
- Latency, –, , 10, 17, 19 –22, 27, 29, 32, 34, 35, 36, 92 –94, 133, 149, 150, 153, 161, 163, 165, 175 –177, 180, 184 –185, 193, 224, 238 –240, 243, 254, 318, 320
- Least frequently used (LFU) strategy, 141
- Least recently used (LRU) strategy, 138, 141
- Least Resources (LR) (job eviction policy), 207, 220 –221
- LFGraph, , 160, 162, 185, 197, 198, 201, 202, 224, 319, 320
- Lincoln, President Abraham, 52
- LinkedIn, 134, 149 –151, 153, 161, 318
- Live migration, 164, 165
- Load balance, 54 –55, 78, 137, 139, 152, 164 –165, 172, 174, 188, 198 –200, 242, 243
- Log-structured file systems (LFS), 151
- Longest Remaining Time (LRT) (task eviction policy), 208, 209, 214, 215, 219 –220
m
- Machine learning, 153, 166, 204, 224, 312, 318, 321
- MapReduce, 32, 134, 136, 137, 153, 161, 167 –168, 204 –207, 208, 209, 210
- MapReduce clusters, 138 –147
- Maude, , 10, 13 –17, 26, 29, 30, 32, 34 –35, 37, 39, 40, 42 –44, 313
- MAUI (mobile cloud system), 241
- Maximizing performance
- Maximum Deadline First (MDF) (eviction policy), 215 –216, 221 –222
- Maximum Laxity First (MLF) (eviction policy), 215 –216, 221 –222
- MediSyn streaming media service workload generator, 146, 147, 148
- Megastore (from Google), , 10, 15 –16, 23 –30, 42, 313
- Megastore-CGC, 29 –30, 42, 313
- Mesos, 168
- MeT, 168
- Microbenchmarks, 93 –94, 187, 193, 216 –221
- Microsoft, 136, 139, 153, 295, 318
- Microsoft Azure, 152, 168
- Microsoft Research, 41
- Middleware, 166, 240
- Migration, , , 54, 127, 161 –167, 169, 170, 172, 175, 176, 178 –179, 180, 187, 191, 195, 196, 198 –203, 237 –238, 241, 243, 246, 250, 253 –254, 257 –258, 277, 285, 301, 320 –321
- Military specifications (mil-spec), 53
- Mimesis synthetic workload generator, 148
- Minimizing energy consumption
- Mobile clouds, , 237 –272, 314, 321 –322
- Model checking, , 10, 12 –16, 19 –20, 22 –30, 32, 37 –43, 129, 315
- Model Predictive Control framework, 166
- MongoDB, , 160, 161, 162, 164, 169 –172, 176, 180, 224, 319
- Monitoring techniques, , 81 –105, 116 –118, 128 –129, 193 –196, 257 –259, 271, 314 –316, 321
- Morphus, , 162, 163, 164 –165, 169, 170 –179, 180, 223, 224, 225, 319 –320
- Morphus-G, 176
- Morphus-H, 176, 179
- Moseley, Gen. T. Michael, 51
- Most Resources (MR) (job eviction policy), 207, 208, 217, 220 –221
n
- Nash equilibria, 49, 55, 61 –79
- National Center for Supercomputing Applications (NCSA), , 104 –118, 316
- data from security incidents, 107 –108
- National information infrastructure, 52 –53
- National Institute of Standards and Technology (NIST), , 280, 281, 286, 298, 301. See also NIST Special Publication SP 800-53
- National Science Foundation, U.S., 44, 160, 272
- Natjam, , 162, 163, 167 –168, 204 –223, 224, 319, 320
- Natjam-R, 206, 215 –216, 221 –223
- Netty, 167
- Network awareness, 175, 178
- Network flow scheduling, 164 –165
- NFS, 146, 151
- NIST. See National Institute of Standards and Technology (NIST)
- NIST Special Publication 800-37, 286
- NIST Special Publication SP 500-293, 301
- NIST Special Publication SP800-53, 287 –288, 298, 300
- NoSQL, , 18, 161, 162, 166, 168 –185, 223, 319, 320
- Numerical analysis, 70, 71 –78
o
- Obama Administration,
- Object request streams, 145, 149, 317 –318
- Office of Management and Budget (OMB), 285, 286
- Offloading of code. See Code offloading
- Offloading of computation. See Code offloading
- Omega, 168
- Online reconfigurations, –, 160 –225, 319 –321
- Operating system design patterns, 128, 315
- Optimization, 15, 19 –20, 30, 37, 39, 54 –55, 78, 151 –154, 161, 164, 165, 168, 186, 197, 198, 202 –203, 205, 215, 254 –257, 304, 319, 320
- Oracle’s Database, 152
- Orchestra, 178
p
- PACMan, 167
- Parameterized protocols, 265
- Parqua, , 162, 163, 164, 169, 170, 179 –185, 224, 225, 319, 320
- Path Integral Quantum Monte Carlo (pi-qmc), 92, 94 –95
- Payment Card Industry (PCI) Security Standard Council, 293
- PCI Data Security Standard (PCI-DSS), 293 –294
- P-D-C-A (Plan, Do, Check, Act) approach, 291 –292
- Performance, –, 10 –17, 22 –23, 25 –27, 29 –30, 34, 37, 39 –40, 42 –43, 81, 82, 84 –87, 90, 92 –97, 101 –102, 104, 110, 133, 136 –137, 141, 143 –146, 153 –154, 160 –225, 243 –244, 246, 254 –259, 271, 280 –281, 312 –313, 315 –321
- Performance assuredness, –, 160 –225, 319 –321
- Performance estimation, 14, 15 –16, 22 –23, 26 –27, 40, 42, 93, 133, 168, 175, 188, 190, 214, 222, 243 –244, 313
- Petal file system, 152
- Petri nets. See Queueing Petri nets
- Piccolo, 168
- Pig Latin, 204
- Pisces, 168
- Platform as a service (PaaS) model, , 278
- PNUTS, 152
- Policy Decision Point (PDP), 250
- Policy Enforcement Point (PEP), 250
- Policy Manager Machine (PMM), 249 –250
- Popularity, , 134, 137 –138, 139 –149, 151, 317 –318
- PowerGraph, 166, 197
- Preemption mechanism, 210 –211
- Pregel (from Google), 197
- Priorities, –, 77, 141, 160, 162, 163, 165, 167 –168, 190, 204 –223, 224, 253 –254, 304, 319 –320
- Privacy for mobile hybrid cloud applications, 247
- Private cloud, , , , 238, 239, 240, 244, 245, 246, 248, 249, 252, 254, 256
- Probabilistically Weighted on Resources (PR) (job eviction policy), 207 –208, 220 –221
- ProWGen, 147
- Public cloud, , , , 49, 52 –54, 57, 58, 138, 238, 239, 240, 244, 245, 246, 247, 248, 249, 253, 254, 256, 278
- PVeStA tool, 14, 16, 20 –22, 32
- PyTorch, 321
q
- Queueing Petri nets, 40
- Quincy, 168
r
- Raft (consensus algorithm), 41, 44
- Railways, 52
- RAMP, , 10, 16, 30 –31, 42, 313
- Read-Atomic Multi-Partition transactions. See RAMP
- Real-time elasticity. See Elasticity
- Real-Time Maude, 14, 16, 23 –24, 26 –28, 30, 40, 42
- Reconfiguration, –, 160 –225, 241 –242, 261, 319 –321
- Relational Cloud, 164
- Resource management, –, 55, 160 –225, 246, 312, 319 –321
- RethinkDB, 170
- Rewriting logic, , 10, 13 –15, 32, 37, 42 –44
- Riak, 180, 200
- Ring-based key value stores, , 162, 180, 224, 319, 320
- Ring-based Vertex Repartitioning (RVR), 198, 200 –201, 203 –204
- Role-based access control (RBAC), , 82, 118 –128, 316. See also Attribute-based access control (ABAC)
s
- Sailfish, 167
- SALSA (actor-model-based programming language), 251, 258
- Sampling, 92, 95, 133, 138, 188, 271, 322
- Samza stream processing solution, 153, 161, 317, 318
- SAS 70. See Statement on Auditing Standards (SAS) No. 70
- Scalability, , , , –, 10, 49, 55, 133 –137, 149, 151, 153, 176, 185, 312, 316 –319
- Scale-out/scale-in, , , 134, 151, 160, 161, 162, 163, 165 –167, 174, 185 –204, 218, 224, 319, 320
- Scaling, , , 96, 133 –135, 145, 147, 317. See also Scale-out/scale-in
- Scarlett, 141
- Scribble, 243
- Security certifications. See Standards
- Security policy, , 237 –272
- Security, Trust & Assurance Registry (STAR), 294, 296
- SEEP, 165
- Service-level agreements/objectives, , 54, 136, 160, 161, 162, 168, 197, 206, 224, 319, 320 –321
- Service Organization Control audits. See SOC reports
- Session delegation, 272, 322
- Session types, 238 –239, 240, 264 –272, 321 –322
- Sharded cloud databases, , , 41, 160, 161, 162, 164 –165, 169, 170 –179, 180, 223, 319
- Shard keys, , 160, 161, 162, 163, 169 –176, 319
- Shared computing infrastructures
- Shortest Remaining Time (SRT) (task eviction policy), 208 –209, 214, 215, 217, 219 –221
- ShuttleDB, 164
- Side-channels, , 55, 90, 97 –98, 101, 103, 278, 295, 315
- Simple Event Correlator (SEC), 105
- Simple Storage System, 37, 42
- Situational awareness, , 81, 82, 85, 314
- SLAs/SLOs. See Service-level agreements/objectives
- Sliding window protocol, 260 –261, 265 –266, 268
- SOC audits, , 285 –286, 289 –290, 322 –323
- Social networks, , 11, 104, 149, 153, 162, 166, 197, 318, 320
- SOC reports, , 277, 285 –286, 288 –290, 303
- Soft cap (in Hadoop), 218, 223
- Software as a service (SaaS) model, , 278
- SPADE, 165
- Spanner, 152
- Spark, 168
- Spark Streaming, 186
- SSTable (Sorted String Table), 180, 181 –183
- Standards, –, 124, 277 –305, 312, 322 –323
- definition, 279 –281
- nongovernmental standards, 281
- performance standards, 280 –281
- purpose of, 281 –283
- technical standards, 280
- voluntary standards, 281
- STAR. See Security, Trust & Assurance Registry (STAR)
- Starfish, 166
- Statement on Auditing Standards (SAS) No. 70, 288 –289, 299
- Statistical sampling, 271, 322
- Stela, , 162, 163, 165, 185 –188, 190 –197, 224, 319, 320
- StopWatch, 101
- Storage. See Cloud storage systems
- Storm. See Apache Storm
- Stormy, 165
- StreamCloud, 165
- STream processing ELAsticity. See Stela
- Stream processing systems. See Distributed stream processing systems
- Strong consistency, , 10, 15 –16, 19 –21, 152
- Survivability, –, 10 –44, 56, 312 –313
- SWIM, 144, 217
- Synchronization between actors. See Actors (…), coordinating
- Synchronizers, 260 –265, 272, 322
- Synthetic workload generation. See Workload generation, synthetic
- Synthetic workloads for big data, 144 –147
- System-A, 265, 266, 269, 272, 322
- System model, 57 –59
- System S. See IBM System S
t
- TAPIR transaction protocol, 40
- Task eviction policies, 167, 206 –210, 214 –221
- Temporal locality, 134, 142 –144, 145, 147, 317
- TensorFlow, 153, 318, 321
- ThinkAir, 241, 255
- Thrashing, 138, 141, 215
- Timestream, 168
- TIRAMOLA, 166
- TLA+ (specification formalism), 37 –42
- TLC (model checker), 37, 40, 42
- Transactional Auto Scaler, 166
- Treacherous Twelve, 296, 299, 301, 305, 323
- Trusted Platform Module hardware, 315
- Trust Services Principles and Criteria (TSPC), 285, 286, 288 –290, 292, 293, 296, 298 –303, 322
- TSPC. See Trust Services Principles and Criteria (TSPC)
- Tuba, 164
- Twitter, 17, 136, 138, 152, 161, 165, 197, 198, 203
u
- Ubiquitous sensors, 154, 237, 319
- Underprivileged users, expanding access to, 53
- United Kingdom, 293
- University of Illinois at Urbana-Champaign, 15, 136, 272
- Use patterns, , 237 –272, 321 –322
v
- Validation, –, 10 –11, 24, 29, 92, 113, 114, 117, 129, 312 –313, 315
- Verdi framework, 41
- Verizon, 279
- Virtualization, , 84, 96, 243, 302, 315
- Virtual machine introspection (VMI). See also Virtual machines (VMs), monitoring, evasion of passive monitoring
- evading with Hypervisor Introspection, 98 –100
- transfer of large files without detection by VMI, 99 –100
- VMI monitor, 96 –100, 102, 103, 315
- Virtual machines (VMs), , , , 49 –79, 82 –103, 128, 160 –161, 163 –164, 166, 179, 185, 186, 238, 241, 254, 278 –279, 314 –316
- monitoring, 84 –103, 314 –316 (See Hprobes; Hypervisor Introspection (HI))
- evasion of passive monitoring, 96 –103, 315
- hook-based systems, , 84 –87
- Ksplice, 85
- Lares, 84, 86
- passive vs. active monitoring systems, 86
- Secure In-VM Monitoring (SIM), 84
- VM suspend side-channel, 97 –98, 100 –102
- VMware hypervisor, 58
- Voldemort, 180
w
- Web Services Choreography Description Language, 242
- Weighted fair sharing (WFS), 164, 175, 178, 179
- Windows Azure Storage. See Microsoft Azure
- Workload generation, synthetic, 144 –151, 317 –318
- Workloads, –, 15, 22, 40, 42, 49, 55, 101 –102, 133 –154, 161, 163, 166, 168, 169, 176 –177, 183, 184 –185, 205 –206, 208, 216, 221, 223, 224, 246, 312 –313, 316 –319
- World War I, 51
y
- Yahoo!, 32, 136, 137, 138, 139, 140, 142, 146, 187, 193 –195, 196, 205, 206, 223, 317, 318
- Yahoo! Cloud Service Benchmark (YCSB), 176, 183, 193
- YAML, 191
- YCSB. See Yahoo! Cloud Service Benchmark (YCSB)
- YouTube, 149, 318
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.