Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 26 - 50 of 7102

Online VM Auto-Scaling Algorithms for Application Hosting in a Cloud

September 1, 2020
Author(s)
Yang Guo, Alexander Stolyar, Anwar Walid
… the auto-scaling problem for application hosting in a cloud, where applications are elastic and the number of … (VMs), which reside on Physical Machines (PMs) in a cloud. We aim to minimize the number of hosting PMs by … IEEE Transactions on Cloud Computing … Cloud, VM choice and placement, Shadow routing …

On Systemic Risk in the Cloud Computing Model

October 23, 2014
Author(s)
Vladimir V. Marbukh
… The major benefits of the emerging cloud computing infrastructure include elimination of the … cloud computing model, dynamic resource sharing, economic … On Systemic Risk in the Cloud Computing Model …

The NIST Definition of Cloud Computing

September 28, 2011
Author(s)
Peter M. Mell, Timothy Grance
Cloud computing is a model for enabling ubiquitous, … Cloud Computing, SaaS, PaaS, IaaS, On-demand Self Service, … The NIST Definition of Cloud Computing

Experiences with Point Cloud Registration

September 1, 2002
Author(s)
Christoph J. Witzgall, Geraldine Cheok
… features. The primary capability is to register a point cloud to a triangulated surface--a TIN surface. If a point cloud is to be registered against another point cloud, then the first point cloud is meshed in order to … Experiences with Point Cloud Registration …

Open Source Private Cloud Platforms for Big Data

February 10, 2017
Author(s)
Martial Michel, Edmond J. Golden III, Olivier Serres, Ahmad Anbar, Tarek El-Ghazawi
… Due to its availability, Cloud computing is the de facto platform of choice for big … best thing. In this book chapter we will first introduce cloud computing, defining the advantages it provides in a big … we will present a case study, using an On-Premise Private Cloud, to demonstrate the implementation of one such …

Formal Definition of Edge Computing: An Emphasis on Mobile Cloud and IoT Composition

June 5, 2018
Author(s)
Charif Mahmoudi, Abdella Battou, Fabrice Mourlin
… Abstract—Mobile cloud computing is an emerging area where two trends come … This paper provides a formal specification of the Mobile cloud component using the π- calculus. The proposed model … formal definition, migration, mobile, mobile cloud computing, offloading, virtualization, virtual device …

Service Model Driven Variations in Security Measures for Cloud Environments

November 6, 2011
Author(s)
Ramaswamy Chandramouli
… With the increasing adoption of cloud computing service models - Infrastructure as a Service … by a single entity - the enterprise. However, in cloud service environments, the control of the various layers is split between the cloud provider and the cloud subscriber based on the cloud

Guidelines for Improving Security and Privacy in Public Cloud Computing

March 28, 2012
Author(s)
Shirley M. Radack
… (SP) 800-144, Guidelines on Security and Privacy in Public Cloud Computing. These new guidelines, which were written by … and Tim Grance of NIST, present an overview of public cloud computing, and discuss the benefits and drawbacks of … of the publication, including NIST's definition of cloud computing, the different models for implementing cloud …

Trusted Cloud: Security Practice Guide for VMware Hybrid Cloud Infrastructure as a Service (IaaS) Environments

April 20, 2022
Author(s)
Murugiah Souppaya, Michael Bartock, Karen Scarfone, Donna Dodson, Daniel Carroll, Gina Scinta, Hemma Prafullchandra, Harmeet Singh, Raghuram Yeluri, Tim Shea, Carlos Phoenix, Robert Masten, Paul Massis, Jason Malnar, Michael Dalton, Anthony Dukes, Brenda Swarts, Rajeev Ghandi, Laura Storey, Rocky Weber, Jeff Haskins
… A cloud workload is an abstraction of the actual instance of a … and enforce their security and privacy policies on their cloud workloads, based on business requirements, in a … way. The goal of this project is to develop a trusted cloud solution that will demonstrate how trusted compute …

Cloud Service Feature Driven Security Policies for Virtualized Infrastructures

July 19, 2011
Author(s)
Ramaswamy Chandramouli
… With the increasing maturity of various cloud service delivery models (Software as a Service (SaaS), … Public, Hybrid), the security risk profile of each cloud service configuration is coming into focus. In this … the example of a Public Infrastructure as a Service (Iaas) cloud provider who provides storage and computing services …

Towards Actionable Mission Impact Assessment in the Context of Cloud Computing

June 22, 2017
Author(s)
Xiaoyan Sun, Anoop Singhal, Peng Liu
… research. This gap is even widened in the context of cloud computing. The gap essentially accounts for the weakest … Mission Impact, Active Cyber Defense, Cloud Computing, Attack Graphs … Actionable Mission Impact Assessment in the Context of Cloud Computing

Framework for Cloud Usability

August 2, 2015
Author(s)
Brian C. Stanton, Mary F. Theofanos, Karun P. Joshi
… Organizations are increasingly adopting cloud-based services to meet their business needs. However, due to the complexity and diversity of cloud systems it is important to evaluate the user experience … define the user experience. In this paper, we propose a cloud usability framework to provide a structure to evaluate …

Cloud Computing: A Review of Features, Benefits, and Risks, and Recommendations for Secure, Efficient Implementations

June 27, 2012
Author(s)
Shirley M. Radack
… presented in NIST Special Publication (SP) 800-146, Cloud Computing Synopsis and Recommendations: Recommendations … and Technology. The publication explains the different cloud computing technologies and configurations, and … should consider when making decisions about implementing cloud computing, NIST SP 800-146 was written by Lee Badger …

Implementing Trusted Geolocation Services in the Cloud

February 17, 2016
Author(s)
Michael J. Bartock, Karen Scarfone, Larry Feldman
… presented in NISTIR 7904, "Trusted Geolocation in the Cloud: Proof of Concept Implementation". The publication … challenges involving Infrastructure as a Service (IaaS) cloud computing technologies and geolocation. … cloud computing, geolocation, Infrastructure as a Service …

The NIST Cloud Federation Reference Architecture

February 13, 2020
Author(s)
Robert B. Bohn, Craig A. Lee, Martial Michel
… This document presents the NIST Federated Cloud Reference Architecture model. This actor/role- based model used the guiding principles of the NIST Cloud Computing Reference Architecture to develop an eleven … federation options from simple to complex. The basics of cloud federation can be described through the interactions of …

Assessing Effects of Asymmetries, Dynamics, and Failures on a Cloud Simulator

March 29, 2015
Author(s)
Kevin L. Mills, James J. Filliben, Christopher E. Dabrowski
… asymmetries, dynamics, and failures when introduced into a cloud computing simulator, which had previously been … to determine whether injecting these new factors into the cloud simulator causes fundamental shifts in macroscopic … introducing asymmetries, dynamics, and failures into the cloud simulator does not induce fundamental shifts in the …

Fog Computing Conceptual Model

March 14, 2018
Author(s)
Michaela Iorga, Larry Feldman, Robert Barton, Michael J. Martin, Nedim S. Goren, Charif Mahmoudi
… computer model. This approach has become known as fog computing. This document presents a definition of fog and mist computing and how they relate to cloud-based computing models for IoT. This document further characterizes … cloud computing, cloudlet, edge computing, fluid computing, fog …

Identifying Evidence for Implementing a Cloud Forensic Analysis Framework

September 28, 2017
Author(s)
Changwei Liu, Anoop Singhal, Duminda Wijesekera
Cloud computing provides several benefits to organizations … of clients. In this paper, we show what evidence from the cloud would be useful to construct the attack scenario by … We propose to implement and design a forensic enabled cloud, which includes installing forensic tools in the cloud

Personalized Voting: The Intersection of Cloud and Mobility

July 21, 2015
Author(s)
Shanee T. Dawkins, Sharon J. Laskowski
… Consortium (GPII) is to create technology for cloud-based accessibility. Using this new technology, users … with enhanced accessibility capabilities based on the cloud-based accessibility work of the GPII, to evaluate the … device (e.g. tablet computer) to exchange data with a cloud-based system to download settings in order to configure …

Cloud-Enabled Prognosis for Manufacturing

June 22, 2015
Author(s)
Robert Gao, Lihui Wang, Roberto Teti, David Dornfeld, Soundar Kumara, Masahiko Mori, Moneer Helu
… service life of equipment. As an emerging infrastructure, cloud computing provides new opportunities to achieve the … and projects their future growth enabled by the emerging cloud infrastructure. Techniques for cloud computing are highlighted, as well as the influence of …

Trusted Geolocation in the Cloud: Proof of Concept Implementation

December 10, 2015
Author(s)
Michael Bartock, Murugiah Souppaya, Raghuram Yeluri, Uttam Shetty, James Greene, Steve Orrin, Hemma Prafullchandra, John McLeese, Jason Mills, Daniel Carayiannis, Tarik Williams, Karen Scarfone
… challenges involving Infrastructure as a Service (IaaS) cloud computing technologies and geolocation. It then … cloud computing, geolocation, Infrastructure as a Service … Trusted Geolocation in the Cloud: Proof of Concept Implementation …

Security Automation for Cloud-Based IoT Platforms

October 21, 2019
Author(s)
Robert B. Bohn, Mheni Merzouki, Charif Mahmoudi, Cihan Tunc
… Internet of Things (IoT) is reshaping the way Cloud Service Providers (CSP) collect data from sensors. With … and our contribution in term of providing a cloud-based automatic mechanism to secure IoT cloud platforms. … Internet of Things, IoT, Cloud Computing, Cybersecurity, Virtualization, Virtual …

In Trust we Trust

October 14, 2010
Author(s)
Keith Miller, Jeff Voas, Phillip Laplante
… for centuries. However after e-trust came along, and then cloud, where e-trust is not sufficient due to the non-touchability of a public cloud, the need to reconsider what trust means for a public cloud arises. This paper looks at the issues of this problem. …

State of Security Readiness

June 10, 2010
Author(s)
Ramaswamy Chandramouli, Peter M. Mell
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and … provider interaction. However, the security readiness of cloud computing is commonly cited, among surveys of …
Displaying 26 - 50 of 7102
Was this page helpful?