IndexAAbstraction,47,120,172,235,241,268AcceleratedProcessingUnit(APU),291Access,102storage,96acceptance,85application,79break-glass,205classes,223control,80,81,325controlfunctionalmodules,190controllanguage,223controllayer,239controlmechanism,216controlpolicy,142,222,224controlpolicyengine,245dataaccesscontrolpolicy,121denial,85event,126lesystem,304I/O,292latency,285,288link,76memory,262,277,285,288on-demandnetwork,323patterns,288policyawareaccesscontrol,131resource,130spoofed,122Accesscontroldiscretionary,222Accesscontrolfunctionalmodulespolicyadministrationpoint(PAP),190policydecisionpoint(PDP),190policyenforcementpoint(PEP),190policyinformationpoint(PIP),190Accesscontrollist(ACL),230,326,327Accesscontrolmodelsattribute,191coalition,199credential,191discretionary,191generalizedrule,200group/team,199history,205identity,191location,200mandatory,191,223role-based,191,223rule,206spatio-temporal,201temporal,200trust,204,206Accessibility,119,120,262Accountability,4,14–16,18Accounting,73,193,196ACLrule,339Actionhistory,17Activitycontext,68Acycliccommunication,288,289Acyclictreetopology,330Adhocmobilecloud,71,76applicationmanager,71contextmanager,71ofoadingmanager,71resourcemanager,71AddressResolutionProtocol(ARP),47Advancedpersistentthreat(APT),173,175Affordability,260Aggregation,181,225Agilecloudsecurityarchitecture,173Agileopportunisticmigration(AOM),54Agility,52,55,97,173,215,216,218,231AISlifecycle(AISL),231K.
J.
Hanetal.
(eds.
),HighPerformanceCloudAuditingandApplications,DOI10.
1007/978-1-4614-3296-8,SpringerScience+BusinessMediaNewYork2014345346IndexAlgebraiccomputations,26Allocation,35,46,172,283algorithms,126cloudresources,324computingresources,66data,284efciency,48management,48multi-criteria,121privileges,198resource,73,100,220servicecomposition,143services,119,127AmazonEC2,6,7,9,10,13Amazonelasticcomputecloud(AmazonEC2),6,48,151,155,302AmazonSimpleStorageService(S3),18AmazonWebServices(AWS),7,8,48AMDfusion,262Androidplatform,75Androidsmartphone,68Annotation,288,289Anomaly,37,127,128,135,137–139,176Anonymization,226ApacheHadoop,302Applicability,67Application-layer,170,173,238proactivedefense,174ARMinstructionset,293Assurance,122,127,130,153,276availability,129communication,128condentiality,122,128,129informationassurancecontrol,120informationcontrol,120integrity,128,129level,121Assuredinformationsharing(AIS),216Assurernaceavailability,129condentiality,129integrity,129AsynchronousDMA,289Atomicity,consistency,isolation,durability(ACID),230Attackanalysis,124APT-likesophisticated,171,175ARPspoong,54availability,76backdoor,56BGPprexhijacking,47botnet,36botnetattackvectors,38classication,102communication-based,120covertchannel,148cross-VM,9cross-VMside-channel,48,191DDoS,324denialofservice(DoS),36detection,125diagnosis,131,138DNSpoisoning,47,54DoS,4,14,75,76,120,139,324drive-bydownload,39,173dynamicdatakernelrootkit,76ooding,4,14,122graphs,123insider,57,137jamming,54,75,77,153Layer-2routingmanipulation,46Layer-3routingpoisoning,47MACooding,46maliciousbodyelement,130man-in-the-middle(MiTM),122,130metadataspoong,8mobile,76modiedciphertext,130packetdropping,120,138passivesnooping,56poisoning,52routehijacking,54sidechannel,10,36,48,148signaturewrapping,7SOAPActionspoong,130sophisticated,184SQLinjection,39stealthy,170,171STSbombardment,140timingcovertchannel,148tree,124XMLrewriting,120,126,130,135,137,138zero-day,170,183Attackgraphs,123Attacktree,124AttackPacketdropping,138Attestation,18Attribute-basedaccesscontrol(ABAC),191,201Auditing,17–21,73,121,176,193,196,260,262,264,265,278,312,313,319analyticalmodel,122auditassets,128,131,132,135audittrails,121,138,139auditableevents,119,120,123,125,129,130,132Index347authority,16cloud,312,324cloudauditingtier,126cloud-wide,119,122,142foundation,120functions,100goal-oriented,122inter-cloudtier,128localaudittrails,129logs,196messageexchange,123records,120request,128,130requirements,120response,128,130root,86scope,120security-related,122serviceauditingtier,125STS,140STSaudittrails,127STStrail,127tier,127trails,123Auditingserver,20Authenticateddatastructures,27Authentication,4,6,47,73,82,190,262,324binding,8browser-basedauthentication,6consumer,84dynamic,56engine,84mobileuser,84module,82token,130XML,6Authority,16,204Authorization,6,82,83,222delegation,191graph,209policy,191requirements,192AutoDockVina,311Automaticcongurationserver,313Automaticparallelization,302Autonomiccomputing,35AutonomousSystem(AS),326Availability,13,15,67,74,79,122,192,215,262,323,324cloudresource,324communicationchannel,324data,93mobilecomputing,73resource,324services,73wirelesscommunication,75BBackdoor,76Backupservice,324Bandwidth,283,285,316,325link,324memory,260,286,290network,307router,324Bandwidthestimationtool,15BasicLinearAlgebraSubroutine(BLAS),272Bayesiananalysis,105Bayesiannetwork,107Bayesiannetworks,93BellandLaPadulamodel,223Benchmark,308,310Linpack,276TeraSort,302TestDFSIO,308BGPextendedcommunityvalues,327ow-spec,326ow-specrules,325prexhijacking,47routing,326Bigdata,91,262,264,283,301,302analysis,93BigTable,109,234Biometriccomputations,27Blacklist,184Bloomlter,228Bloomlterencoding(BFE),227BorderGatewayProtocol(BGP),47,326Botnet,36,171attackvectors,38C&C,38C&Coperation,173commandandcontrol(C&C),171communication,38detectiontechniques,37drive-bydownload,39footprint,38formation,38lifecycle,38livepopulation,38mobileattack,76movingtargetdefense,41networktopologiesandcommunications,41operation,171348IndexBotnet(cont.
)passivedetection,38polymorphism,52populationmeasurements,38proactiveinltration,38rallying,38,42round-robin,42,147socialnetworks,39softwarevulnerabilities,39spamcampaign,39Botnetdetectionanomaly-based,37DNS-based,37heuristic-based,37mining-based,37Botnets,40,41,44,329Bottleneck,74,76,293,307Break-glassaccesscontrol,205BridgeProtocolDataUnit(BPDU),47Brokenprotocol,127Browsersecurity,6CC++AcceleratedMassiveParallelism(C++AMP),271Caching,284,286,307Cachinghierarchy,263CAISS,242datalayer,246policyenginelayer,245userinterfacelayer,243Capacity,283Capacityscheduler,305CarrierIQ,75CellBroadbandEngine(BE),263,265,267Centralprocessingunit(CPU),284Certication,204Challenge-responsemechanism,19,21Characterization,102Clark-Wilsonintegritymodel,13Client-serverarchitecture,68Cloning,68Cloudaccessprotocols,67Cloudauditing,126,275,313,323,324CloudC2securitycenter,170CloudC2securitymodulesinformationaggregation,182informationfeedback,183informationfusionandanalysis,182informationsharing,183Cloudcomputing,35,92,104,110,147,151,169,230,261,274,276,301,313,323Cloudcomputingcharacteristicsbroadnetworkaccess,189measuredservice,189on-demandself-service,189rapidelasticity,189resourcepooling,189Cloudcontroller(CLC),314Cloudmanagement,67Cloudmanagemententities,125Cloudmanager(CM),128,134Cloudresourceallocation,324Cloudresourcemanagement,172Cloudsecurity,46,121,170–173,324CloudSecurityAlliance(CSA),237Cloudsecurityarchitecture,170,171,173Cloudservers,66,68,79Cloudservicearchitecture,123Cloudservicemodelsinfrastructureasaservice(IaaS),192platformasaservice(PaaS),192softwareasaservice(SaaS),192Cloudserviceplatform,109Cloudserviceprovider(CSP),19,36,121,196,324Cloudsession,127Cloudstorageservice,171Cloudtopology,74Cloud-baseddatamanagement,109Cloud-basedinformationfusion,109Cloud-enabledBayesnetwork(CEBN),91,93,103,108CloudBurst,311Cloudlet,69–71,75,76Cluster,233,234,260Clustercomputing,104,105Clustercontroller(CC),314Co-residentVMs,9,10Coalition-basedaccesscontrol(CBAC),199Codepartitioning,77,82Cognitive-observe-orient-decide-act(C-OODA),108Coherence,283Collaborativedataprocessing,110Colluding,77Commandandcontrol(C&C),38,41,42,171Commonadministration,326CommonCongurationEnumeration(CCE),135Commonroutingpolicy,326CommunicationCGCM,289channel,122CPU-GPU,288Index349cross-cloud,128CUDA-lite,288inter-cloud,314Inter-node,289links,77memory,288Communicationprotocol,132CommunicationService,107Commutativeencryption,226Compatibilityofservices,121Complexity,37,67,283Compositionchain,127Computationoutsourcing,5,22–27integrityverication,24–27privacyprotection,22–24Computationverication,24–27duplicatetaskexecution,25ringer,25Computationalintensiveapplications,68ComputeUniedDeviceArchitecture(CUDA),260,267Compute-intensive,65,109,172,260,312Computingautonomic,35cloud,35,92,104,230,301,323cluster,104,105compute-intensive,172CPU-GPU,293data-intensive,172,261distributed,301exascale,283federatedcloud,173GPGPU,260GPU,260,261grid,35,104heterogeneous,104highperformance,110,289hybrid,283hybridCPU-GPGPU,284MATLABGPU,271mobile,67mobilecloud,65,67neuromorphic,265parallel,273,274performance,290resources,313,323serviceoriented,92super,105utility,35,105veriable,24Computing-intensiveapplications,67Condorcluster,265Condence,91Condentiality,74,77,79,122,127,192,215storedresources,130Congurablethreshold,293Conguration,35,36,47,73,121,126,130,262accesscontrol,195audit,82CPU-GPU,264MapReduce,302memoryhierarchy,293static,36ConjugateGradient(CG)programming,272Connecteddominatingset(CDS),53Context-awaresecurityarchitecture(CASA),200Control,93Cookie,8Countermeasures,123,124,152,170,183,184Covertchannel,148,152,153CPU-GPU,259CPU-GPUcommunicationmanager(CGCM),288Credential-basedaccesscontrol,191Criticaldata,86Criticalinformation,215Crosssitescripting(XSS),8Cross-cloudcommunication,128,130Cross-cloudevents,128,130Cross-domaincommunication,122Cross-mechanismsdefense,184Cross-VMattack,9Cross-VMinformationleakage,9,10Cryptographicblinding,148Cryptographickeys,154Cryptographicsolutions,80CUDA,285,287,289compiler,268cuBLAS,269directmemoryaccess(DMA),267FastFourierTransform(CUFFT),269GPGPU,289kernel,268libraries,268MPI-CUDAmodel,289programming,268Customattackhandler,126Cyberforensics,102Cyberthreats,183CyberinfrastructureofRecongurableOpticalNetworking(CRON),312Cycliccommunication,288Cyclictopology,330350IndexDDarkclouds,36Dataaggregator,84characterization,102communication,284copyingthroughput,289denitionlanguage,234distribution,303integrity,127intensiveapplication,303,306intermediate,307loading,236locality,302,306management,85,284manager,305manipulation,262mediation,100parallelism,263perturbation,226processing,85querying,236rate,288resource,126sampling,226semi-structured,172storagedevice,295structured,172transfer,263,289,291Datadenitionlanguage(DDL),234Datafusioninformationgroup(DFIG)modelLevel0dataassessment(DA),93Level1objectassessment(OA),93Level2situationassessment(SA),94Level3impactassessment(IA),94Level4processrenement(PR),94Level5userrenement(UR),94Level6missionmanagement(MM),94Datamanipulationlanguage(DML),234Datamining,101,226Datastorage,92Data-intensive,109,172,260,286Data-intensivecomputing,261Databaseaccess,111Databasemanagementsystems(DBMS),101DCGSintegrationbackbone(DIB),219DDR3memory,294Deadzones,76Decisionmaking,108Decisiontree,121Defensetree,124Delay,150,160Delegation,126,127,129,139,195Denialofservice(DoS),4,9,14,130,324Detection,120Diagnosis,138,139,141Differentiatedservicescodepoint(DSCP),326,328Digitalsignature,123Digitalsubscriberline(DSL),148DirectGPUcommunication,262Directmemoryaccess(DMA),289DirectX(DX),261DirectX11graphicscore,291Discretememorylesschannel(DMC),153Discretionaryaccesscontrol(DAC),191,222content-basedaccesscontrol,222context-awareauthorization,222negativeauthorization,222rolebasedaccesscontrol,223temporalauthorization,222DiskI/Obound,310Dissemination,81,95,111,325,328Distancecomputation,27Distributedcluster,306Distributedcommongroundsystem(DCGS),219Distributedcomputing,301Distributeddatabases,230Distributeddenialofservice(DDoS),324Distributedlesystem,303Distributedprocessing,275Distributedprogramming,302DNAmatching,23DNS,7,9,38DNScaches,47DNSpoisoning,47,54DNSquery,47Dom0IPaddress,10Domaingenerationalgorithm(DGA),42DomainNameSystem(DNS),7DRAM/PCMhybridmemorystructure,295Drive-bydownload,39,173Dynamiccyberthreats,170Dynamicdatakernelrootkit,76Dynamicdependenceinformation,289Dynamicrandom-accessmemory(DRAM),285DynamicVMsynthesis,70EEarlywarning,170Efciency,215,260Elasticapplications,82,83Elasticmanager,69Elasticmobileapplications,84Elasticservices,82Index351Elasticity,13,46,191Embeddedapplications,285Encryption,127End-to-endlink,307End-to-endround-tripmessaging,121Energybudget,295Energyconsumption,73,291Energyefciency,265,276Enforcement,190,192EnterpriseService,107Entity,141,304EnvironmentforXACMLpolicyanalysisandmanagement(EXAM),224Error-correctioncode,21Estimation,93Eucalyptus,7,8,302,313,314Exascale,283Executionverication,16EXtensibleAccessControlMarkupLanguage(XACML),198ExtensibleMarkupLanguage(XML),6,120,223FFairscheduler,304Fastux,44Faultcode,132,140Faultrecords,130Faulttolerance,303Feasibility,70,73Federatedcloud,128FederatedcloudC2securitymodules,181Federatedcloudcomputing,173Federatedcloudsecurityarchitecture,173Federatedclouds,122,129,305,306Federatedidentitymanagement,7Federatedinformationsharing,218Federation,122Feedback,100,181Field-programmablegatearray(FPGA),291FIFOscheduler,304Fileallocationtable(FAT),230Filesystem,15,304Filtering,323,325actions,327dynamiclteringrules,325overhead,328realization,325router-based,324rule,326Firewall,183,193,325rulesets,206Firewallrulesets,193FirstIn,FirstOut(FIFO),153,303First-come,rst-served(FCFS),147Flexibility,119,122,287Floodingattack,4,14Floodingping,338Flowspecication(Flow-Spec),326,327footprint,38Forensicanalysis,182,183FreeBSDjail,48Frequencyscaling,289Front-end,293Functionalprogramming,274Fusion,181Fusioncontrollink(FCL),292Fuzzymulti-levelsecurity(FuzzyMLS),203GGDDRmemory,294General-purposeprogrammingonGPU(GPGPU),259,283GeneralizedRBAC(GRBAC),200GeneralizedtemporalRBAC(GTRBAC),200GEO-RBAC,200,201GingerMaster,75GlobalInformationGrid(GIG),219GlobalPositioningSystem(GPS),67GoogleFileSystem(GFS),231,233GoogleFusionTables,92,109,110Governance,220GPGPU,260,262,291hybridCPU-GPGPU,283programming,267,271security,260,276GPUacceleration,266,272architecture,262computing,261CPU-GPUcommunication,288CPU-GPUcomputing,293CPU-GPUsystem,287devices,262heterogeneousCPU-GPUsystem,264hybridCPU-GPU,276memoryhierarchy,285MPI-GPUprogramming,289NVIDIA,293performance,286processingpipeline,261GPUPLA,273Graphtransformation,246Graphicsdoubledatarate(GDDR),286Graphicsmemorycontroller(GMC),292Graphicsprocessingunit(GPU),104,259,285352IndexGridcomputing,35,104Groupcontext,68Group-centricsecureinformationsharing(g-SIS),224Group-orientedaccesscontrol,199GST-RBAC,201GuestOS,11,12,52,181,191HHadoop,72,233,241,259,275,302,303,314masterservice,303performance,315scheduling,303streaming,275HadoopDistributedFileSystem(HDFS),233,303,307Harddiskdrive(HDD),285Hard-codedURL,44Hard-softfusion(HSF),103Hardwarevirtualization,4,9,10,12HBase,234,236Heterogeneouscomputing,104Heterogeneoussystem,287HeterogeneousVMreplication(HVMR),52Hierarchicallesystem(HFS),230Highperformance,260,293Highperformancecomputing,286,289Highperformanceconnectivity,291Highspeednetwork,312,314Hippocraticdatabases,226History-basedaccesscontrol,205Hive,232,234,237,241HiveQL,234,241Homomorphicauthenticator,21Homomorphicencryption,22,26,80Honeynet,37Honeypot,174,178,183honeypot,178Honeytoken,170,180HPVirtualPartitions,52HTTP,38,41,44,236HTTPredirect,6Humansystemsintegration(HSI),94Hybridcomputing,283HybridP2P-basedC&C(HPCC),45HypertextTransferProtocol(HTTP),6,121Hypervisor,11,48,52,172,191,313,314II/Oandmemorylatency,264I/Ooperation,267I/Otrafc,293IBMSmartCloud,302ID3,228Identitybinding,16Identitymanagement,127Identitytheft,36Identity-basedaccesscontrol,191Image,66,171,314Imagecloning,68Imagestitching,66Inference,95,150,151,226,236InniBandconnection,265Informationfederation,100Informationow,148Informationowcontrol,122Informationfusion,91,92Informationfusionmodeling,93Informationfusionsituationassessment(IFSA),95Informationfusionsystem(IFS),92high-levelinformationfusion(HLIF),92low-levelinformationfusion(LLIF),92Informationleakage,122,148,151Informationmanagement,92Informationmanagement(IM),97,101Informationmobility,218Informationservice,107Informationsharing,183Informationsharingpolicyengine,246Informationspaces,100Informationtainting,123,133InfrastructureasaService(IaaS),6,8,101,105,121,276Integrationservice,109Integrity,11–13,17,18,67,74,79,81,122,192,324computation,73data,127dataquery,172datastorage,172mobilecomputing,77outsourceddata,22,24remotestorageprotection,4,18,20storedresources,130verication,24,26Intelligence,surveillanceandreconnaissance(ISR),219Intensivecomputationaljobs,65Inter-cloudauditingtier,128bandwidthanddelay,315communication,314events,130invocationchain,121Index353messageexchange,123servicecompositions,122Inter-cloudcommunication,119Inter-corecommunication,261Inter-domainroutingprotocol,326Interchangeability,191interference,75Intermediatebuffer,289Internalcloudinfrastructure,191InternetControlMessageProtocol(ICMP),326InternetProtocol(IP),326Internetserviceprovider(ISP),47,326Interoperability,97,110,121,195,224Invocationchain,132Iperfserver,340Isolation,80,81,169,191,192JJamVM,72Javasimpliedencryption(JASYPT),239Javavirtualmachine(JVM),69JCUDA,288Jena,235,236JenaSDB,236Jena-HBase,236Jitter,73Jobqueue,304Jobscheduler,305Jointdirectorofthelaboratories(JDL),95JointTestAccessGroup(JTAG),74KK-anonymity,226Kademlia,44KAoS,223Kerberostoken,6Kernelcode,11Kernelcomputation,270Kernel-basedVirtualMachine(KVM),313Keylogging,36LLargeareaimagerecorder(LAIR),103Largescaleparallelcomputing,294Lastlevelcache(LLC),81Latency,307access,288bounded,70interactive,73limitation,70memory,263,293programming,295Latency-sensitiveCPU,294Layer-2,47Layer-2QoS,46Layer-3,47Layer-3routingpoisoningattack,47Legitimatetrafc,331Limitationofwear-leveling,296Line-levelmapping,296Linearprogramming,26LinearTemporalLogic(LTL),224Llano,291,294Llanoarchitecture,291Loadbalancing,193Localmaptask,304Localmessageerrorhandlers,123Location-basedservice(LBS),68Loggingentities,123fundamentalconcepts,120history,127logs,16mechanisms,120,123scope,125tokenactivity,130Longer-latencyGDDRmemory,295Loopparallelism,274Loop-freelayer-2routing,46MMAClayer,75Machine-processableformats,244,245MagneticTunnelJunction(MTJ),295Maliciousactivity,124,277bodyelement,130host,330insider,137IPaddress,183nodes,76packet,325polymorphism,51trafc,174,323,326,330,331user,153website,171,173,183,184Maliciouspenetration,123Malware,9,11,75,184,276,277mobiledevices,75Malwarepolymorphism,52ManagedInformationObject(MIO),98Managementfunctions,107354IndexMandatoryAccessControl(MAC),78,191,223,245Many-core,260MapCG,275Mapping,296MapReduce,23,24,231,233,234,259,260,264,274,302ApacheHadoop,302atomic-based,275cloudapplications,310ClouderaHadoop,302cluster,306framework,303global,306Google,302hierarchical,305jobs,302,303optimization,306,312,314performance,308programming,310scheduling,307VM,306Masterbootrecord(MBR),39Mathworksparallelcomputingtoolbox(PCT),271MATLABGPUcomputing,271MD5-RC4encryption,277Measured-servicefeature,191MediaAccessControl(MAC),46Megastore,109Memoryaccess,277hierarchy,295bandwidth,260,263,285,286buffer,292channel,292coherence,283design,283external,286global,285GPU,267hierarchy,263,284hierarchycongurations,293latency,263,293metrics,284morphable,296on-board,78request,263requirements,295sharing,285trafc,292wall,283Merklehashtree,17,21Messageattackdetectionhandlers,123MessagePassingInterface(MPI),272,289Metadata,19,98,100,247Metadatadescription,8Metadataformats,110Metadataspoongattack,8Metrics,101Microsoftactiveserverpage(MSASP),39MicrosoftAzure,9MicrosoftHyper-V,48MicrosoftPassport,6Middleware,69Migration,46,69,83,283,284,286Mirage,81Misconguration,47Misuse,141Mitigation,46,153,174Mobileapplications(apps),67Mobileclient-serverarchitectures,67Mobilecloudcomputing,65,66,74Mobilecloudcomputingsecurity,77Mobileclouds,82Mobilecomputing,67Mobiledevices,65,67,74Mobilenetwork,67Mobileoperatingsystem(MOS),67,78Mobileuserauthentication,82MobilityasaService,74Monitoring,74,121,122,174Monitoringfunctions,100Movablemodules,69Movingtargetdefense(MTD),35–37MPICH2,289Multi-bankSRAM,285Multi-core,285,286Multi-levelcell(MLC),295Multi-levelsecurity(MLS),148Multi-parallelintrusiondetectionarchitecture(MIDeA),277Multi-ProtocolLabelSwitching(MPLS),47Multi-tasking,147Multi-tenancy,191Multi-tenantdatamanagement,86Multi-terminalbinarydecisiondiagram(MTBDD),224Multi-threadedCPU,276Multi-threading,264,268Multi-threadingparallelism,274Multi-tiercloudinfrastructure,82Multicore,261,268,272Multiplevirtualizedphones,66Multistagememorycontroller,292Index355NNa¨veBayes,228NANDash,285Naturallanguageprocessing(NLP),102Net-centricsensormanagement,110NetworkAddressTranslation(NAT),38,43Networkawarescheduling,306Networkbandwidth,307Networkdefense,102Networkemulator,313NetworkI/Obound,310Networkinterfacecard(NIC),314Networkintrusiondetectionandpreventionsystem(NIDPS),174,178,183Networklayerreachabilityinformation(NLRI),326Networktopology,307Networktrafc,150Network-centricarchitecture,92Network-layer,170Network-layerproactivedefense,174NEuca-patchedEucalyptusclouds,314Nodecontroller(NC),314NorthBridge,292,293NVIDIA,262,263NVIDIADenver,293OObjectassessment,108Observe-orient-decide-act(OODA),95Ofoading,66,68,69,72,73Ontology,91,93,101,102,110,225API,236cyberforensic,102languages,236OWL,224,236RDFS,236security,102uncertaintyreduction,103OpenComputingLanguage(OpenCL),261OpenGeospatialConsortium(OGC),92OpenGraphicsLibrary(OpenGL),261OpenMobileTerminalPlatform(OMTP),78OpenACC,271OpenCirrus,302OpenCL,260,264,267–269OpenMP,289Openstack,302Opticalber,313Optimization,283,288,289,312OSidentication,11Outsourcing,5,47,109,171computation,22privacyprotection,22Overnet/KademliaP2Pnetworks,44OWL,236,242PP-accountability,18P2P,38Packetdropping,122Packetsnifng,74Pailliercryptosystem,227ParallelLinearAlgebra(PLA),273Paralleloperation,262Parallelprogramming,285Parallelism,286Parallelization,303Paravirtualization,48Passivesnooping,56Patch,179Penetration,35,123Performance,147,323advantages,260bottleneck,307cloudcomputing,324cloudlet,70computing,290CPU,286CPU-GPU,283degradation,289factors,73GPU,286Hadoop,315MapReduce,308mobilecomputing,72query,236security,72,73status,121storage,236PeripheralComponentInterconnect(PCI),262PeripheralComponentInterconnectexpress(PCIe),287Personalidenticationnumber(PIN),84,221PetaFLOPS,265Phasechangememory(PCM),295Pipeline,286PlanetLab,46PlatformasaService(PaaS),5,8,101,105,121PlatformasaService(Paas),276Poisoning,47Poisoningprevention,52PoissonParetobursttrafc(PPBT),157356IndexPolicy,84,220accesscontrol,222,224accesscontrolfunctionalmodules,190break-glassaccesscontrol,205conditional,247dataaccesscontrolpolicy,121dynamicallyadaptable,197integration,224messageowcontrolpolicy,120policy-awareaccesscontrol,131RDF,232reciprocity,247scheduling,148,158symmetry,247XACML,224Polymorphism,51,52Polynomialevaluation,27Portability,110PortlandGroup,Inc(PGI),288Powerbudget,283Powerconstraints,76Powerconsumption,284,289Powerefciency,283,289Privacy,67,73,74,215,324Privacymetric,159,160Privacyprotection,22Privacy-preserving,148,202Privacy-preservingdatamining,228Privacy-preservingrecordlinkage,227Privacy-preservingscheduling,158Privacy-preservingschedulingpolicies,149Privacy-preservingtechniques,227Proactivecyberdefense,170Proactivedefensecontrolloop,183Probabilisticallycheckableproofs,26Processorcaching,292desktop,291embedded,291mobile,291ultra-mobile,291Programannotation,289Programmer-suppliedannotations,288Programminglatency,295Proof-carryingauthorization(PCA),202Proofsofretrievability,20Provenance,225,246,248Provision,46Publiccloud,324Publicveriability,20PyCUDA,271PyOpenCL,271QQEMU,52QoSbasedrouting,330QoSmiscongurations,47Quagga,327QualityofService(QoS),35,99,149,330Query,236Queryeditor,244Queryprocessing,226QuestOSsecurity,179Queuing,149,153,304Queuingchannel,153RROWLBAC,224Rackspace,302Radeonmemorybus(RMB),292Rallying,38RDF,224,236graphs,236RDFgraphs,236RDFschema(RDFS),236Reachability,326Reachabilityanalysis,82Reactivecyberdefense,170Readoperation,296Recongurablememorycontroller,289Redactionpolicyengine,245Redirect,184Redirection,325Reducedinstructionsetcomputer(RISC),271Rei,223Reication,236Relationaldatabase,172,230Reliability,283,324Remotecluster,302Remoteprocedurecall(RPC),39Remotestorageprotection,4,18,20,21sentinel,20,21Remotestorageprotectionsentinel,20,21Replicatedserver,324Rerouting,324Resilient,35Resourceaccess,130allocation,35,220annotation,102audittrail,126justication,248management(RM),172misuse,122,141,142policy-aware,126,130requirements,101Index357resourcemanagement(RM),93RMfunctions,93utilization,120ResourceDescriptionFramework(RDF),224,235Resourcemisuse,141Retractinformation,100Revocationofobsoleterule,329RFC5575,326Risk,129,203analysis,73federation,130security,220Risk-adaptableaccesscontrol,203Roleactivation,200enablinganddisabling,200engineering,206hierarchy,200Rolebasedaccesscontrol(RBAC),191,225,240,245Rootauditing,86cloud,86user,86Rootkit,11RootMaster,75Round-robin(RR),147Round-triptime(RTT),149Routehijacking,54Router,325Routerbandwidth,330Router-basedltering,324,325Routing,325Routinginformation,326Routingtable,325Rule-basedaccesscontroldomainconstraints,206history-basedconstraints,206Runtimeenvironment,303Runtimekey,78SSameOriginPolicy(SOP),6,7SandyBridge,262Scalability,191,215,290Scalablesharedpool,323Scheduling,147,302capacity,305delay,316fair,304FIFO,303Hadoop,303,317Hadoopdefault,304MapReduce,304policy,149Scienticcomputations,23SCIRun,273Securecodepartitioning,82Securecodepartitioningandofoading,82Securecommunication,83Secureconversation,130Securedatamanagement,85Securedataprocessing,85,86Secureelasticframework,82Securemigration,82Securemobilecloudcomputing,85Securemobiledatamanagement,82Securemobileoperatingsystem,78Securemulti-partycomputation,23Securesession,126SecureShell(SSH),13,154Securesocketslayer(SSL),277SecureUML,205Security,91,92,99,102,119,215,216administration,198assurancelevel,121awareness,123cloud,324cloudC2securitymodules,181cloudcomputing,79cloudsecurityconcerns,121cloudservers,79cloud-widesecurityauditing,123components,82concerns,46cost,123criticalcode,78fuzzymulti-level,203GPGPU,260,276issues,72,120levels,81measures,73,77,277mobilecloudcomputing,73,77mobiledevicestorage,78mobiledevices,77ontology,102operatingsystem,78patch,179performance,73perimeter,35policy,80,100properties,67SCT,127session,77situation,203SOA,121358IndexSecurity(cont.
)solutions,67,77standards,130STS,127tokenactivity,123tokens,84VMimage,183VMM,80vulnerabilitypatterns,120webservicessecurity(WS-security),123Securitycomponentsmoduleauthentication,82permissionauthorization,83secureinstallation,82securemigration,83SecurityContextToken(SCT),127Securitylayersapplication-layer,175network-layer,177system-layer,179Securitymechanism,170Securitymonitormechanism,183Securitytechnicalimplementationguide(STIG),120SecurityTokenService(STS),120,127Security-relatedinformation,123Segregationoftenants,191SELinux,23Semanticcontent,102Semanticallyrichlanguage,223Semanticallyrichlanguages,224Semanticsaccesscontrol,201accesspolicy,199RBAC,204Semi-structureddata,172Sensitiveinformationdisclosure,120Separationofduty(SoD),196Sequencecomparisons,23DNAmatching,23Server-sidepolymorphism,51Serviceaudittrail,125Servicecloudarchitecture,121Servicecomposition,127,132,143Serviceinvocationchain,120,123,127ServiceLevelAgreement(SLA),100,121Serviceorientedcomputing,92Service-orientedarchitecture(SOA),96,97,110,120–122,143Service-orientedcloud,120Sessioninvolvementactivity,120sessionID,131sessionmanager(SM),126,130sessionmanagerhistory(SMH),127SMproxies,126Setoperationcomputations,27Sharing,181Shellscript,313Shortmessageservice(SMS),75Shortest-job-rst(SJF),147Sidechannel,148Sidechannelattack,10Signaturewrappingattack,7Silicononinsulator(SOI),291SimpleObjectAccessProtocol(SOAP),7,125,128Simpleobjectaccessprotocol(SOAP),120Simultaneousmulti-thread(SMT),152Simultaneoustrackingandidentication(STID),103,105,108,109Singlechipsolutions,262Singleinstructionmultipledata(SIMD),263,293Singleinstructionmultiplethread(SIMT),261Singleprogrammultipledata(SPMD),274Situationassessment,95Situationawareness,95,170,203,218application-layer,170cloudC2securitycenter,170network-layer,170system-layer,170SLAmatching,130Smartphone,67SOAP,7,8Socialcloud,171Socialnetworks,39SoftwareasaService(SaaS),5,6,101,105,121,231,276Softwarepipelining,267Softwarevulnerabilities,39SolarisContainer,52Solidstatedrive(SSD),285SOP,7Sort,310Spamcampaign,36,39Spamcampaigns,171Spanningtreeprotocol(STP),46SPARQL,236,244,245Spatialcontext,68Spatio-temporalRBAC,201Spectrumsharing,92Speculativeexecution,286Spinprecession,295Spyingchannel,152SRAM,295SSHbackdoor,13StandardTemplateLibrary(STL),269Index359Staticanddynamicpartitionalgorithms,69Staticcompile-timeanalysis,288StaticRandom-AccessMemory(SRAM),285Stealthyattack,170,171Storage,236,284,313Storageaccesscontrol,96Storagecontroller(SC),314Storagefunction,262StorageI/O,310Streamingmultiprocessor(SM),285Streamingprocessor(SP),285StreamMR,275Structureddata,172StructuredQueryLanguage(SQL),110STT-RAM,295Subscriberidentitymodule(SIM),78Supercomputing,105Superscalarexecution,286Synchronization,303System-layer,170TTainting,122,123,133Tamper-evidentlogs,16Targetsequence,127TCPandUDPsocketprogramming,40Team-basedaccesscontrol(TMAC),198TemporalRBAC(TRBAC),200,223TeraFLOPS,265TestDFSIO,308TheOnionRouter(TOR),154Thinclient,68Threads,147,263Threatmodel,120Threats,67,119,122,129,131,142,170,277,330mitigationstrategies,121againstclouds,172APT,173cloudsecurity,172colluding,77dynamic,170,183evidence,129mobilecloudcomputing,74mobiledevices,77patterns,128Thresholddecryption,228Throughput,288Throughputnetwork,262Tianhe-1system,267,276Tianhe-1A,290Timedivisionmultipleaccess(TDMA),149Timetolive(TTL),41Timeless,91Timingchannel,153Timingcovertchannel,148Timingsteganographicchannel,154TIUPAM,231Toolcommandlanguage(Tcl),327Top-leveldomain(TLD),42Traceroute,10Trafc,151,174,178,206,308Trafcanalysis,150Transformationprocess,102Transmission,130TransmissionControlProtocol(TCP),40TransportLayerSecurity(TLS),6Treetopology,330Trojanhorse,12Trust-basedaccesscontrol(TBAC),204Trust-basedaccesscontrolmodelpermission-roleassignment(PRA),208rolehierarchy(RH),208separationofduty(SoD),208user-roleassignment(URA),208Trust-basedsearch,110TrustBAC,204TrustCube,84TrustedComputerSystemEvaluationCriteria(TCSEC),153Trustedcomputingbase(TCB),231Trustedconversation,122,138,139,141TrustedPlatformModule(TPM),78,172Tsubame,290Typeofservice(TOS),339UUbiquitous,200,204UKbasedwebhosting,48Unauthorizedexternalserviceinvocation,123Uncertaintyreasoning,92Uncertaintyreduction,92,103Uncertaintyrepresentation,92Unicastrouting,326Uniedmemoryarchitecture(UMA),292Unixlesystem(UFS),230Untrusteddevices,73UpperTierServer(UTS),44URLFlux-basedC&C(UFCC),45UserDatagramProtocol(UDP),40Userinterface(UI),68,83Utilitycomputing,35,105VValidation,126,127,129Vectorprocessing,263360IndexVeriableaccounting,77Veriablecomputing,24Veriableresourceaccounting,18Vericationcomputation,24integrity,24Virtualcluster,314Virtuallayer,306Virtuallocalareanetwork(VLAN),46Virtualmachine(VM),9,10,12,36,151,172,262,306Virtualmachineintrospection(VMI),11,81Virtualmachinemanager(VMM),66,80security,80Virtualmachinemonitor(VMM),11,172,181Virtualnetworkenvironment,313Virtualroutingandforwarding(VRF),327VirtualBox,70Virtualization,4,48,67,76,81Visualization,109VM,9–11,70,178,191VMco-resident,9VMimage,12,52,81VMimagemanagement,171,175VMimagemanagementsystem,81VMimagesecurity,183VMimagesize,71VMinstances,48,50VMmigration,56VMoverlay,70,71VMreplication,52VMverier,13VMMSecurity,171VMMsecurity,179VMware,48VoiceoverInternetProtocol(VoIP),154Vulnerabilities,67,119,123,124,141,191assessment,77cloud-wide,121DNS,47image,81network,35operatingsystem(OS),178patterns,131,143software,39,173Vulnerabilitydiagnosistree(VDT),120,131assetchecknode,132determinationnode,132diagnosticnode,132WWalrus,314Warpspecialization,267Webapplicationlayer,238Webcontentanalysis,183WebOntologyLanguage(OWL),224Webservice,127WebServiceDenitionLanguage(WSDL),8Weblets,69,83Websiteanalysis,182Wideareamotionimagery(WAMI),98,103WindowsNTlesystem(NTFS),230WirelessAccessPoint(WAP),70Wirelessdatalinks,71WirelessLocalAreaNetwork(WLAN),70Wirelesssensornetwork(WSN),109Wirelesswideareanetwork(WWAN),69Workow,99Writeoperation,296,308WS-SecureConversation,127WS-Security,127WS-Trust,127WSDL,8XX-GTRBAC,204X-RBAC,204XACML,198,205,225,237,242XACML+OWL,225Xen,13,48,52XML,225,235XMLauthentication,6XMLencryption,7XMLsignature,7XMLtoken,6XML-basedaccesscontrollanguage(XACML),223XML-basedRBACpolicy,204ZZspecicationlanguage,200Zeroknowledgeproofs,228ZQL,239
提速啦简单介绍下提速啦 是成立于2012年的IDC老兵 长期以来是很多入门级IDC用户的必选商家 便宜 稳定 廉价 是你创业分销的不二之选,目前市场上很多的商家都是从提速啦拿货然后去分销的。提速啦最新物理机活动 爆炸便宜的香港CN2物理服务器 和 日本CN2物理服务器香港CTG E5 2650 16G内存 20M CN2带宽 1T硬盘 150元/月日本CN2 E5 2650 16G内存 20M C...
GreencloudVPS此次在四个机房都上线10Gbps大带宽VPS,并且全部采用AMD处理器,其中美国芝加哥机房采用Ryzen 3950x处理器,新加坡、荷兰阿姆斯特丹、美国杰克逊维尔机房采用Ryzen 3960x处理器,全部都是RAID-1 NVMe硬盘、DDR4 2666Mhz内存,GreenCloudVPS本次促销的便宜VPS最低仅需20美元/年,支持支付宝、银联和paypal。Gree...
官方网站:点击访问青果云官方网站活动方案:—————————–活动规则—————————1、选购活动产品并下单(先不要支付)2、联系我司在线客服修改价格或领取赠送时间3、确认价格已按活动政策修改正确后,支付订单,到此产品开设成功4、本活动产品可以升级,升级所需费用按产品原价计算若发生退款,按资源实际使用情况折算为产品原价再退还剩余余额! 美国洛杉矶CN2_GIACPU内存系统盘流量宽带i...
securitycenter为你推荐
域名价格域名怎么评估价钱?linux虚拟主机如何配置linux虚拟主机asp主机asp虚拟主机租用哪里好?已备案域名查询如何查询已备案的域名是否在万网备案的?中文域名注册查询中文.com域名是什么,怎么注册虚拟主机代理请问虚拟主机的代理和虚拟主机分销有什么区别?分销的主机是不是可以把主机分给多个用户使用?我用的ResellerClub代理!!海外主机美国主机与国内主机有哪些区别网站域名空间网站域名和空间网站空间商网站空间商的选择??万网虚拟主机万网虚拟、专享、独享主机有什么区别?
美国linux主机 亚洲大于500m 本网站服务器在美国维护 warez x3220 踢楼 秒解服务器 softbank官网 魔兽世界台湾服务器 小米数据库 美国十次啦服务器 台湾谷歌地址 秒杀预告 域名评估 空间合租 卡巴斯基是免费的吗 如何建立邮箱 百度云空间 卡巴斯基试用版下载 黑科云 更多