The future of multi-clouds: A survey of essential architectural elements
In this paper we present a vision of an environment composed of multiple independent cloud
providers of various sizes, interconnected by programmable networks in which tenants may …
providers of various sizes, interconnected by programmable networks in which tenants may …
ImPACT: A networked service architecture for safe sharing of restricted data
In this paper we describe an architecture developed and prototyped in the course of the NSF-
funded project called ImPACT—Infrastructure for Privacy-Assured CompuTations. This …
funded project called ImPACT—Infrastructure for Privacy-Assured CompuTations. This …
Toward live inter-domain network services on the exogeni testbed
A key dimension of reproducibility in testbeds is stable performance that scales in regular
and predictable ways in accordance with declarative specifications for virtual resources. We …
and predictable ways in accordance with declarative specifications for virtual resources. We …
Federated authorization for managed data sharing: Experiences from the ImPACT project
This paper presents the rationale and design of the trust plane for ImPACT, a federated
platform for managed sharing of restricted data. Key elements of the architecture include …
platform for managed sharing of restricted data. Key elements of the architecture include …
A logical approach to cloud federation
Federated clouds raise a variety of challenges for managing identity, resource access,
naming, connectivity, and object access control. This paper shows how to address these …
naming, connectivity, and object access control. This paper shows how to address these …
Logical peering for interdomain networking on testbeds
Research testbed fabrics have potential to support long-lived, evolving, interdomain
experiments, including opt-in application traffic across multiple campuses and edge sites …
experiments, including opt-in application traffic across multiple campuses and edge sites …
{TapCon}: Practical {Third-Party} Attestation for the Cloud
One way to establish trust in a service is to know what code it is running. However, verified
code identity is currently not possible for programs launched on a cloud by another party …
code identity is currently not possible for programs launched on a cloud by another party …
Semantic intelligence in a seaport context
AX Halabi-Echeverry, JC Vergara-Silva… - 2018 IEEE/ACS 15th …, 2018 - ieeexplore.ieee.org
This research work proposes the framework for seaport partners to interact on a semantic
level and scope related with jurisdictions/ecosystems and regions to share knowledge …
level and scope related with jurisdictions/ecosystems and regions to share knowledge …
Service management in distributed system
PH Jiang, H Zhao, L Wen, GY Xu - US Patent 11,968,233, 2024 - Google Patents
A trust rule between a first service and a second service in a plurality of services deployed in
a distributed system is received; the trust rule defines whether the first service is allowed to …
a distributed system is received; the trust rule defines whether the first service is allowed to …
[图书][B] A Logical Controller Architecture for Network Security
Y Yao - 2020 - search.proquest.com
Networked infrastructure-as-a-service testbeds are evolving with higher capacity and more
advanced capabilities. Modern testbeds offer stitched virtual circuit capability, programmable …
advanced capabilities. Modern testbeds offer stitched virtual circuit capability, programmable …