Please use this identifier to cite or link to this item: http://bura.brunel.ac.uk/handle/2438/7259
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTaylor, GA-
dc.contributor.authorWallon, D-
dc.contributor.authorTurilli, M-
dc.contributor.authorHargreaves, N-
dc.contributor.authorMartin, A-
dc.contributor.authorRaun, A-
dc.contributor.authorMcMoran, A-
dc.date.accessioned2013-02-25T11:45:33Z-
dc.date.available2013-02-25T11:45:33Z-
dc.date.issued2011-
dc.identifier.citationIEEE Third International Conference on Cloud Computing Technology and Science (CloudCom), Athens, Greece, pp. 247 - 254, Nov 2011en_US
dc.identifier.isbn978-1-4673-0090-2-
dc.identifier.urihttp://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6133150&tag=1en
dc.identifier.urihttp://bura.brunel.ac.uk/handle/2438/7259-
dc.descriptionCopyright @ 2012 IEEEen_US
dc.description.abstractCloud Computing provides an optimal infrastructure to utilise and share both computational and data resources whilst allowing a pay-per-use model, useful to cost-effectively manage hardware investment or to maximise its utilisation. Cloud Computing also offers transitory access to scalable amounts of computational resources, something that is particularly important due to the time and financial constraints of many user communities. The growing number of communities that are adopting large public cloud resources such as Amazon Web Services [1] or Microsoft Azure [2] proves the success and hence usefulness of the Cloud Computing paradigm. Nonetheless, the typical use cases for public clouds involve non-business critical applications, particularly where issues around security of utilization of applications or deposited data within shared public services are binding requisites. In this paper, a use case is presented illustrating how the integration of Trusted Computing technologies into an available cloud infrastructure - Eucalyptus - allows the security-critical energy industry to exploit the flexibility and potential economical benefits of the Cloud Computing paradigm for their business-critical applications.en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.subjectCloud computingen_US
dc.subjectCloud securityen_US
dc.subjectTrusted computingen_US
dc.subjectEnergy industryen_US
dc.titlemyTrustedCloud: Trusted cloud infrastructure for security-critical computation and data managmenten_US
dc.typeConference Paperen_US
dc.identifier.doihttp://dx.doi.org/10.1109/CloudCom.2011.41-
pubs.organisational-data/Brunel-
pubs.organisational-data/Brunel/Brunel Active Staff-
pubs.organisational-data/Brunel/Brunel Active Staff/School of Engineering & Design-
pubs.organisational-data/Brunel/Brunel Active Staff/School of Engineering & Design/Electronic and Computer Engineering-
pubs.organisational-data/Brunel/University Research Centres and Groups-
pubs.organisational-data/Brunel/University Research Centres and Groups/School of Engineering and Design - URCs and Groups-
pubs.organisational-data/Brunel/University Research Centres and Groups/School of Engineering and Design - URCs and Groups/Brunel Institute of Power Systems-
Appears in Collections:Electronic and Computer Engineering
Publications
Dept of Electronic and Electrical Engineering Research Papers

Files in This Item:
File Description SizeFormat 
Fulltext.pdf596.46 kBAdobe PDFView/Open


Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.