{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:10:51Z","timestamp":1750306251771,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,3]],"date-time":"2017-04-03T00:00:00Z","timestamp":1491177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,3]]},"DOI":"10.1145\/3019612.3019633","type":"proceedings-article","created":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T20:27:45Z","timestamp":1497558465000},"page":"405-410","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Assessing end-to-end performance and security in cloud computing"],"prefix":"10.1145","author":[{"given":"Kaiqi","family":"Xiong","sequence":"first","affiliation":[{"name":"University of South Florida"}]},{"given":"Mufaddal","family":"Makati","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2017,4,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"IDC \"http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS24472713.\"  IDC \"http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS24472713.\""},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046664"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2010.30"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879143"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_1_6_1","unstructured":"\"National vulnerability database NIST.\" https:\/\/nvd.nist.gov.  \"National vulnerability database NIST.\" https:\/\/nvd.nist.gov."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2013.12.037"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/956993.956995"},{"key":"e_1_3_2_1_9_1","unstructured":"\"iperf.\" https:\/\/iperf.fr\/.  \"iperf.\" https:\/\/iperf.fr\/."},{"key":"e_1_3_2_1_10_1","unstructured":"\"Pathneck - http:\/\/www.cs.cmu.edu\/hnn\/pathneck\/.\"  \"Pathneck - http:\/\/www.cs.cmu.edu\/hnn\/pathneck\/.\""},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.67"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECBS.2005.57"},{"key":"e_1_3_2_1_13_1","first-page":"442","volume-title":"Cloud and Grid Computing (CCGrid)","author":"Lenkala S. R.","year":"2013","unstructured":"S. R. Lenkala , S. Shetty , and K. Xiong , \" Security risk assessment of cloud carrier,\" in Proceedings of the 13th IEEE\/ACM International Symposium on Cluster , Cloud and Grid Computing (CCGrid) , pp. 442 -- 449 , 2013 . S. R. Lenkala, S. Shetty, and K. Xiong, \"Security risk assessment of cloud carrier,\" in Proceedings of the 13th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pp. 442--449, 2013."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381913.2381932"},{"key":"e_1_3_2_1_15_1","volume-title":"Enforcing end-to-end application security in the cloud,\" in Proceedings of the ACM\/IFIP\/USENIX 11th International Conference on Middleware","author":"Bacon J.","year":"2010","unstructured":"J. Bacon , D. Evans , D. Eyers , M. Migliavacca , P. Pietzuch , and B. Shand , \" Enforcing end-to-end application security in the cloud,\" in Proceedings of the ACM\/IFIP\/USENIX 11th International Conference on Middleware , 2010 . J. Bacon, D. Evans, D. Eyers, M. Migliavacca, P. Pietzuch, and B. Shand, \"Enforcing end-to-end application security in the cloud,\" in Proceedings of the ACM\/IFIP\/USENIX 11th International Conference on Middleware, 2010."},{"key":"e_1_3_2_1_16_1","volume-title":"Erasure coded storage systems for cloud storage - challenges and opportunities,\" in Proceedings of the IEEE ICDE","author":"Thomas J.","year":"2016","unstructured":"J. Thomas , S. MadhuKumar , and P. Chandran , \" Erasure coded storage systems for cloud storage - challenges and opportunities,\" in Proceedings of the IEEE ICDE , 2016 . J. Thomas, S. MadhuKumar, and P. Chandran, \"Erasure coded storage systems for cloud storage - challenges and opportunities,\" in Proceedings of the IEEE ICDE, 2016."},{"key":"e_1_3_2_1_17_1","volume-title":"Communication and Energy Systems","author":"Binesh J.","year":"2015","unstructured":"J. Binesh and S. MadhuKumar , \" Telecom grade cloud computing: Challenges and opportunities,\" in Proceedings of the IEEE International Conference on Signal Processing, Informatics , Communication and Energy Systems , 2015 . J. Binesh and S. MadhuKumar, \"Telecom grade cloud computing: Challenges and opportunities,\" in Proceedings of the IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems, 2015."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2107556.2107564"},{"key":"e_1_3_2_1_19_1","volume-title":"Qrp01--6: Resource optimization subject to a percentile response time SLA for enterprise computing,\" in Proceedings of the IEEE Globecom","author":"Xiong K.","year":"2006","unstructured":"K. Xiong and H. Perros , \" Qrp01--6: Resource optimization subject to a percentile response time SLA for enterprise computing,\" in Proceedings of the IEEE Globecom , 2006 . K. Xiong and H. Perros, \"Qrp01--6: Resource optimization subject to a percentile response time SLA for enterprise computing,\" in Proceedings of the IEEE Globecom, 2006."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2006.20"},{"key":"e_1_3_2_1_21_1","first-page":"30","volume-title":"SLA-based service composition in enterprise computing,\" in Proceedings of the 16th International Workshop on Quality of Service (IWQoS)","author":"Xiong K.","year":"2008","unstructured":"K. Xiong and H. Perros , \" SLA-based service composition in enterprise computing,\" in Proceedings of the 16th International Workshop on Quality of Service (IWQoS) , pp. 30 -- 39 , IEEE , 2008 . K. Xiong and H. Perros, \"SLA-based service composition in enterprise computing,\" in Proceedings of the 16th International Workshop on Quality of Service (IWQoS), pp. 30--39, IEEE, 2008."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-008-9126-9"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2009.5160987"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2015.18"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2006.135"},{"key":"e_1_3_2_1_26_1","volume-title":"IEEE","author":"Xiong K.","year":"2006","unstructured":"K. Xiong , \"Web services performance modeling and analysis,\" in Proceedings of the International Symposium on High Capacity Optical Networks and Enabling Technologies , IEEE , 2006 . K. Xiong, \"Web services performance modeling and analysis,\" in Proceedings of the International Symposium on High Capacity Optical Networks and Enabling Technologies, IEEE, 2006."},{"key":"e_1_3_2_1_27_1","unstructured":"K. Xiong \"Resource optimization and security in distributed computing \" NCSU Dissertation 2009.  K. Xiong \"Resource optimization and security in distributed computing \" NCSU Dissertation 2009."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","DOI":"10.1002\/9781118898598","volume-title":"Resource Optimization and Security for Cloud Services","author":"Xiong K.","year":"2014","unstructured":"K. Xiong , Resource Optimization and Security for Cloud Services . John Wiley & Sons , 2014 . K. Xiong, Resource Optimization and Security for Cloud Services. John Wiley & Sons, 2014."}],"event":{"name":"SAC 2017: Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Marrakech Morocco","acronym":"SAC 2017"},"container-title":["Proceedings of the Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3019612.3019633","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3019612.3019633","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:57Z","timestamp":1750220637000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3019612.3019633"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,3]]},"references-count":28,"alternative-id":["10.1145\/3019612.3019633","10.1145\/3019612"],"URL":"https:\/\/doi.org\/10.1145\/3019612.3019633","relation":{},"subject":[],"published":{"date-parts":[[2017,4,3]]},"assertion":[{"value":"2017-04-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}