
New Frontiers in Information and Software as Services
Beschreibung
Weitere Details
Weitere Ausgaben
Inhalt
- LNBIP 74
- Preface
- Table of Contents
- Service Design
- Study of Software as a Service Support Platform for Small and Medium Businesses
- Introduction
- SMBs Oriented SaaS Ecosystem
- Massive Multi-tenancy
- Overview of Multi-tenancy Patterns
- Cost-Effectiveness
- Security Isolation
- Performance Isolation
- Availability (Fault) Isolation
- Flexibility: Configuration and Customization
- Configuration and Customization in Multi-tenancy Environment
- Configuration and Customization Competency Model
- A Framework to Plan and Execute Configuration and Customization Strategy
- Service Lifecycle Management
- SaaS Service Lifecycle Overview
- Service Subscription Model
- Case Study: Service Subscription of the Retail B2B Case
- Related Work
- Summary
- References
- Design Patterns for Cloud Services
- Introduction
- Data Model
- Requirements of Cloud Services
- New Data Model: Uniquely Keyed Elements
- Data Access in the New Data Model
- Existing Cloud Data Stores
- Computing Model
- Large-Scale Data Processing
- Interactive Cloud Services
- Complex Service Compositions
- Distributed Agreement
- Consistency Model
- Weak Consistency due to Asynchronous Replications
- Possible Weak Consistency Models
- Conclusions and Future Works
- References
- Service Security
- Secure Data Management Service on Cloud Computing Infrastructures
- Introduction
- Background
- Encryption-Based Data Security
- Private Information Retrieval
- Information Distribution
- Overview of the Proposed Framework
- Practical Solutions for Secure Data Outsourcing
- Efficient Retrieval
- Query Processing
- ExactMatch Queries
- Range Queries
- Aggregation Queries
- Join Operations
- Extensions
- Different Types of Data
- Database Updates
- Fault-Tolerance
- Management of Private and Public Data
- Efficiency, Usability and Security Tradeoffs
- Concluding Remarks
- References
- Security Plans for SaaS
- Introduction
- SaaS Threat Model
- Provider-Originated Threats
- Architectural Threats
- SaaS Security Mechanisms and Best Practices
- Service Redundancy
- Diversity Implementation
- Isolation
- Channel Protection
- Access Control
- Service Integrity
- Accounting and Auditing
- Anomaly Detection
- Data Protection
- Assessing SaaS Security
- Risk Analysis When Planning SaaS
- Formal Model of SaaS Risks
- Examples of Risk Graphs Usage
- Conclusions
- References
- Service Optimization
- Runtime Web-Service Workflow Optimization
- Introduction
- Web Service Wrapping
- Workflow Modeling
- Stochastic Workflow Modeling
- Instance Critical Paths
- Critical Graph
- Resource Allocation
- Resource Model
- Algorithm
- Discussion
- Allocation Stability
- Asynchronous Messaging
- Limited Storage
- Experiments
- Related Work
- Conclusions
- References
- Adaptive Parallelization of Queries Calling Dependent Data Providing Web Services
- Introduction
- The WSMED System
- The Web Service Query Service
- WSMED Server Components
- The Web Service Schema
- Operation Wrapper Function
- Queries over Dependent Web Service Calls
- Motivating Scenario
- The Parallel Process Tree
- FF_APPLYP
- Query Parallelization in WSMED
- FF_APPLYP Performance
- Adaptive Apply in Parallel - AFF_APPLYP
- Related Work
- Conclusion
- References
- Data-Utility Sensitive Query Processing on Server Clusters to Support Scalable Data Analysis Services
- Introduction
- RanKloud: Scalable Middleware for Utility-Sensitive Data Processing on Server Clusters
- uSplit: Utility-Sensitive Data Partitioning for Parallel Top-k Join Processing
- Runtime Statistics Collection
- Allocation of the Data Sampling Budget
- Impact of the Sample Size on the Quality of Join Selectivity Estimates
- Selecting the Utility Partition Boundaries
- Discussion
- Computing the Lower Bound, $\Theta_k$
- Balanced Work Allocation
- Experiments
- Effectiveness of the Adaptive Sampling
- Impact of uSplit on Processing Times
- Conclusions
- References
- Multi-query Evaluation over Compressed XML Data in DaaS
- Introduction
- Related Work
- Preliminaries
- XPath Containment
- XML Compression Technique
- Structural Query Index Tree
- Query Translation
- Structural Query Index Tree
- Building the SQIT
- Multi-query Evaluation at the DSP
- Single Query Evaluation over the SXP
- Multi-query Evaluation over the SQIT
- Evaluation Strategy
- Experiments
- Experimental Setting
- The Building Performance of the SQIT
- Performance of Query Evaluation
- Comparison with SAXON
- Conclusion
- References
- The HiBench Benchmark Suite: Characterization of the MapReduce-Based Data Analysis
- Introduction
- Related Work
- The Hibench Suite
- Evaluation and Characterization
- Conclusion and Future Work
- References
- Multi-tenancy and Service Migration
- Enabling Migration of Enterprise Applications in SaaS via Progressive Schema Evolution
- Introduction
- Scope of Problem
- Design Approach
- Basic Migration Operators
- Cost Estimation for One Snapshot
- Check Point Selection
- Local Adaptive Model
- Global Adaptive Model
- Experimental Evaluation
- QueryWorkload
- Situations for Comparison
- Experimental Parameters
- PerformanceMeasurements
- Performance Results
- Related Works
- Conclusion and Further Work
- References
- Towards Analytics-as-a-Service Using an In-Memory Column Database
- Introduction
- The Rock Framework
- Update PropagationModel
- TREX Database
- Estimating OLAP Workload for an MCDB
- Analyzing Relation between Request Rate and Tenant Size
- Analyzing Relation between ReadWorkload and 99% Percentile Value
- Calculating Costs
- Cost/Performance Tradeoffs for High Availability
- Test Setup
- Comparing Throughput Using One Single Node
- Recovery from Log
- Comparing Throughput Using Multiple Nodes
- Evaluation
- Support for Historical Data
- Concepts for Archiving on Top of Rock
- Test Setup
- Related Work
- Capacity Planning andWorkload Models
- Highly Available Shared Nothing Architectures
- Temporal Databases and Historical Queries
- Conclusion
- References
- What Next?
- At the Frontiers of Information and Software as Services
- Introduction
- SLAs, SaaS Types, and Current Offerings
- Level 1: Ad-Hoc/Custom
- Level 2: Configurable
- Level 3: Configurable,Multi-tenant-Efficient
- Level 4: Scalable, Configurable,Multi-tenant-Efficient
- Modeling and Describing Business Logic
- Application Servers and Virtual Machines
- Multi-tenant Data Management
- Data Clouds for Large Scale Data Services
- MapReduce-Based Intensive Data Processing
- Beyond MapReduce
- Other Applied SaaS Systems
- Not Just Software
- Conclusions and the Future of Research and Development at the Frontier
- References
- Author Index
Systemvoraussetzungen
Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m.
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.