최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국통신학회논문지. The Journal of Korea Information and Communications Society. 네트워크 및 서비스, v.36 no.9B, 2011년, pp.1066 - 1072
정임영 (서울대학교 컴퓨터공학부 분산컴퓨팅시스템 연구실) , 조인순 (서울대학교 컴퓨터공학부 분산컴퓨팅시스템 연구실) , 유영진 (서울대학교 컴퓨터공학부 분산컴퓨팅시스템 연구실)
Cloud Computing Environment provides users with a blue print of IT Utopia with virtualization; unbounded computing power and data storage free from the cost and the responsibility of maintenance for the IT resources. But, there are several issues to be addressed for the Cloud Computing Environment t...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
Kiran-Kumar Muniswamy-Reddy, Peter Macko, and Margo Seltzer, "Provenance for the Cloud", in Proceedings of 8th USENIX Conference on File and Storage Technologies (FAST '10), Feb 2010
Kiran-Kumar Muniswamy-Reddy and David A. Holland, "Causality-Based Versioning", ACM Transactions on Storage (ACM TOS), Dec 2009
Wikipedia, http://en.wikipedia.org/wiki/Cloud_computing
H. Erdogmus, "Cloud computing: Does nirvana hide behind the nebula?", IEEE Software 11, 2 (March-April 2009), pp.4-6.
I. Foster, Y. Zhao, I. Raicu, and S. Lu, "Cloud computing and grid computing 360-degree compared", In Proceedings of Grid Computing Environments Workshop, GCE'08 (Austin, TX, 2008), pp.1-10.
R. Gellman, "Privacy in the clouds: Risks to privacy and confidentiality from cloud computing", Tech. rep., February 2009
Pubchem, http://pubchem.ncbi.nln.nih.gov/
Genbank, Nucleic Acids Research 36 (Database Issue) (Jan. 2008)
R. Hasan, R. Sion, and M. Winslett, "Introducing secure provenance: problems and challenges", In Proceedings of ACM workshop on Storage security and survivabilit, StorageSS '07 (Alexandria, Virginia, USA, October 2007), pp.13-18.
L. M. Kaufman, "Data security in the world of cloud computing", IEEE Security & Privacy 7, 4 (July-Aug. 2009), pp.61-64.
Luc Moreau, Ben Clifford, Juliana Freire, Joe Futrelle, Yolanda Gil, Paul Groth, Natalia Kwasnikowska, Simon Miles, Paolo Missier, Jim Myers, Beth Plale, Yogesh Simmhan, Eric Stephan, Jan Van den Bussche, "The Open Provenance Model core specification (v1.1)", Future Generation Computer Systems, 2010, doi:10.1016/j.future. 2010. 07. 005
T. Sterling, and D. Stark, "A high-performance computing forecast: Partly cloudy", Computing in Science & Engineering 11, 4 (July-Aug. 2009), pp.42-49.
J. Voas, and J. Zhang, "Cloud computing: New wine or just a new bottle?", IT Professional 11, 2 (March-April 2009), pp.15-17.
Crypto++ library 5.5.2, available at http://www.cryptopp.com/
QuickHash Library, available at http://www.slavasoft.com/quickhash/index.htm
Z. CHEN, AND L. MOREAU, "Implementation and evaluation of a protocol for recording process documentation in the presence of failures." In Proceedings of Second International Provenance and Annotation Workshop (IPAW'08).
I. FOSTER, J. VOECKLER, M. WILDE, AND Y. ZHAO, "The Virtual Data Grid: A New Model and Architecture for Data-Intensive Collaboration.", In CIDR (Asilomar, CA, Jan. 2003).
P. GROTH, L. MOREAU, AND M. LUCK, "Formalising a protocol for recording provenance in grids. In Proceedings of the UK OST e-Science Third All Hands Meeting 2004 (AHM'04) (Nottingham,UK, Sept. 2004). Accepted for publication.
Y. L. SIMMHAN, B. PLALE, AND D. GANNON, "A framework for collecting provenance in data-centric scientific workflows", In ICWS '06: Proceedings of the IEEE International Conference on Web Services (2006).
R. Bose, "A conceptual framework for composing and managing scientific data lienage", In Proceedings of the 14th International Conference on Scientific and Statistical Database Management, pp.15?19, 2002.
A. Chapman, B. Blaustein and C. Elsaesser, "Provenance based belief", in Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, July 2010.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.