i hc Công ngh ngành: ; 60 48 10 PGS.TS. 2011 Abstract: Keywords: ; ; Microsoft azure; Content Cì nó . . , , - , , . , , . , , . , . . 2 vào. các tài nguyên tính toán. nay có Nam. 3 -các mây. References [1] Announcing the Advanced Encryption Standard (AES) [2] CFengine (2009) http://www.cfengine.org/ [3] Buco MJ et al (2004, Jan) Utility computing SLA management based upon business objectives. IBM Syst J 43(1):159178 [4] David Chappel (2009), Introducing Windows Azure [5] David S Linthcum , Praise for Cloud Computing and SOA Convergence in Your Enterprise [6] David Chappel (2009), Introducing Windows Azure [7] David S Linthcum , Praise for Cloud Computing and SOA Convergence in Your Enterprise [8] Dominic Betts, Scott Densmore, Ryan Dunn, Masashi Narumoto, Eugenio Pace , Moving Application to Cloud on the Microsoft Windows Azure [9] GoGrid’s prepaid cloud hosting plans (2009). http://www.gogrid.com/pricing/plans.php [10] Henry Li (2009), Introduction to Windows Azure [11] Hongwei Li, Yuanshun Dai , Bo Yang , Identity-Based Cryptography for Cloud Security [12] http://www.microsoft.com/windowsazure/Whitepapers/introducingwindowsazureplatfor m/ [13] http://msdn.microsoft.com/en-us/library/ee922714.aspx [14] http://msdn.microsoft.com/en-us/library/dd179346.aspx [15] Liang Yan, Chunming Rong, and Gansen Zhao , Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography [16] Nick Antonopoulos (2010), Computer Communications and Networks [17] P. Angin, B. Bhargava, R. Ranchal, N. Singh, L. Ben Othmane, L. Lilien, and M. Linderman, “A User-Centric Approach for Privacy and Identity Management in Cloud Computing,” Proc. 29th IEEE Intl. Symp. on Reliable Distributed Systems (SRDS), New Delhi , India, Nov. 2010. [18] OASIS (Organization for the Advancement of Structured Information Standards) (2009) http://www.oasis-open.org/ [19] Ristenpart T et al (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. Proceeding of ACM conference on computer and communications security 4 [20] Robert Elsenpeter Ph.D, Velte Toby J. Velte(2010) Cloud Computing: A Practical Approach [21] Robin Bloor, Marcia Kaufman, and Dr. Fern Halper (2010), Cloud Computing for dummies Judith Hurwitz [22] rPath (2009) http://www.rpath.com [23] Sheehan M (2009) Message from GoGrid founders regarding denial of service attack. Retrieved from, GoGrid Official Blog, http://blog.gogrid.com/ [24] Tejaswi Redkar (2009), Windows Azure Platform [25] Sriram Krishnan (May 2010), Programming Windows Azure . Windows Azure [11] Hongwei Li, Yuanshun Dai , Bo Yang , Identity-Based Cryptography for Cloud Security [12] http://www .microsoft. com/windowsazure/Whitepapers/introducingwindowsazureplatfor m/. http://www .microsoft. com/windowsazure/Whitepapers/introducingwindowsazureplatfor m/ [13] http://msdn .microsoft. com/en-us/library/ee922714.aspx [14] http://msdn .microsoft. com/en-us/library/dd179346.aspx