2013 Proceedings IEEE INFOCOM 2013
DOI: 10.1109/infcom.2013.6566849
|View full text |Cite
|
Sign up to set email alerts
|

PACE: Policy-Aware Application Cloud Embedding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 45 publications
(32 citation statements)
references
References 14 publications
0
32
0
Order By: Relevance
“…To prevent policy violation, PACE [10] presented an online algorithm for application mapping onto DC topology, however, it only considers one-off VM placement, which poses a problem of adaptability with dynamic workloads.…”
Section: Resources Utilisationmentioning
confidence: 99%
“…To prevent policy violation, PACE [10] presented an online algorithm for application mapping onto DC topology, however, it only considers one-off VM placement, which poses a problem of adaptability with dynamic workloads.…”
Section: Resources Utilisationmentioning
confidence: 99%
“…As these virtual machines are managed, secure control by the hypervisor because new instance that is guest operating system used in virtual machines are installed on a hypervisor and this hypervisor works as a middleware between virtual machines and the hardware. That's why hypervisors are the main target of the hackers or attackers for performing malicious activities [6].…”
Section: Virtualized Technologymentioning
confidence: 99%
“…In this figure a VPN Firewall is installed which uses the concept of IP tunneling the tunnel is generated from router A to router D in this scenario .As we want that sales clients A and C can access the database and remote login, that's why there is a need of IP tunneling to encapsulate the packets [6]. Now in this scenario sales client D and B can't access the database and the remote login access, because there is no tunnel between router B to router D. So difference between the only Firewall and VPN Firewall is Firewall block or filter the services for all users, but VPN Firewall can block some required users or allow some required users also [7].…”
Section: Fig 2: Network With Vpn_firewallmentioning
confidence: 99%
“…Applications over DC networks have complex communication patterns which are governed by a collection of network policies regarding security and performance. In order to implement these policies, network operators typically deploy a diverse range of network appliances or "middleboxes", including firewalls, traffic shapers, load balancers, Intrusion Detection and Prevention Systems (IDS/IPS), and application enhancement boxes [1]. Across all network sizes, the number of middleboxes is on par with the number of routers in a network, hence such deployments are large and require high up-front investment in hardware totalling thousands to millions of dollars [2] [3].…”
Section: Introductionmentioning
confidence: 99%