{"id":"https://openalex.org/W1986611901","doi":"https://doi.org/10.1109/dsn.2009.5270350","title":"Dependability in the cloud: Challenges and opportunities","display_name":"Dependability in the cloud: Challenges and opportunities","publication_year":2009,"publication_date":"2009-06-01","ids":{"openalex":"https://openalex.org/W1986611901","doi":"https://doi.org/10.1109/dsn.2009.5270350","mag":"1986611901"},"language":"en","primary_location":{"id":"doi:10.1109/dsn.2009.5270350","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsn.2009.5270350","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE/IFIP International Conference on Dependable Systems &amp; Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016905266","display_name":"Kaustubh Joshi","orcid":null},"institutions":[{"id":"https://openalex.org/I1283103587","display_name":"AT&T (United States)","ror":"https://ror.org/02bbd5539","country_code":"US","type":"company","lineage":["https://openalex.org/I1283103587"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kaustubh R. Joshi","raw_affiliation_strings":["A and T Laboratories Research, Florham Park, NJ, USA","A&T Labs - Research, 180 Park Ave, Florham Park, NJ, 07932, USA"],"affiliations":[{"raw_affiliation_string":"A and T Laboratories Research, Florham Park, NJ, USA","institution_ids":["https://openalex.org/I1283103587"]},{"raw_affiliation_string":"A&T Labs - Research, 180 Park Ave, Florham Park, NJ, 07932, USA","institution_ids":["https://openalex.org/I1283103587"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038473793","display_name":"Guy Bunker","orcid":null},"institutions":[{"id":"https://openalex.org/I1308906816","display_name":"NortonLifeLock (United States)","ror":"https://ror.org/0449t3a80","country_code":"US","type":"company","lineage":["https://openalex.org/I1308906816"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Guy Bunker","raw_affiliation_strings":["Symantec Corporation, Reading, Berkshire, UK","Scientist and Distinguished Engineer, Symantec Corporation, 350 Brook Dr., Green Park, Reading Berkshire, RG2 6UH, UK"],"affiliations":[{"raw_affiliation_string":"Symantec Corporation, Reading, Berkshire, UK","institution_ids":[]},{"raw_affiliation_string":"Scientist and Distinguished Engineer, Symantec Corporation, 350 Brook Dr., Green Park, Reading Berkshire, RG2 6UH, UK","institution_ids":["https://openalex.org/I1308906816"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078067855","display_name":"Farnam Jahanian","orcid":null},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Farnam Jahanian","raw_affiliation_strings":["Department of EECS, Arbor Networks, University of Michigan, Ann Arbor, MI, USA","CSE, Dept. of EECS, Univ. of Michigan, USA"],"affiliations":[{"raw_affiliation_string":"Department of EECS, Arbor Networks, University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]},{"raw_affiliation_string":"CSE, Dept. of EECS, Univ. of Michigan, USA","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072969450","display_name":"Aad van Moorsel","orcid":"https://orcid.org/0000-0001-7233-6943"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Aad van Moorsel","raw_affiliation_strings":["School of Computing Science, University of Newcastle, Newcastle-upon-Tyne, UK","School of Computing Science, Newcastle University, Newcastle-Upon-Tyne, NE1 7RU, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing Science, University of Newcastle, Newcastle-upon-Tyne, UK","institution_ids":["https://openalex.org/I84884186"]},{"raw_affiliation_string":"School of Computing Science, Newcastle University, Newcastle-Upon-Tyne, NE1 7RU, UK","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011100243","display_name":"Joseph B. Weinman","orcid":null},"institutions":[{"id":"https://openalex.org/I1283103587","display_name":"AT&T (United States)","ror":"https://ror.org/02bbd5539","country_code":"US","type":"company","lineage":["https://openalex.org/I1283103587"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Joseph Weinman","raw_affiliation_strings":["AT and T Business Solutions, Bedminster, NJ, USA","AT&T Business Solutions, One AT&T Way, Rm. 4D128, Bedminster, NJ 07921, USA"],"affiliations":[{"raw_affiliation_string":"AT and T Business Solutions, Bedminster, NJ, USA","institution_ids":["https://openalex.org/I1283103587"]},{"raw_affiliation_string":"AT&T Business Solutions, One AT&T Way, Rm. 4D128, Bedminster, NJ 07921, USA","institution_ids":["https://openalex.org/I1283103587"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5016905266"],"corresponding_institution_ids":["https://openalex.org/I1283103587"],"apc_list":null,"apc_paid":null,"fwci":11.8448,"has_fulltext":false,"cited_by_count":37,"citation_normalized_percentile":{"value":0.98270262,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"103","last_page":"104"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9728000164031982,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9692000150680542,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/dependability","display_name":"Dependability","score":0.9088843464851379},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8968105316162109},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6692022681236267},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6257374286651611},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.5516881346702576},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.492049902677536},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.4801611304283142},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.4740811586380005},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.45716679096221924},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.0844687819480896}],"concepts":[{"id":"https://openalex.org/C77019957","wikidata":"https://www.wikidata.org/wiki/Q2689057","display_name":"Dependability","level":2,"score":0.9088843464851379},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8968105316162109},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6692022681236267},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6257374286651611},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5516881346702576},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.492049902677536},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.4801611304283142},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.4740811586380005},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.45716679096221924},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0844687819480896},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dsn.2009.5270350","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsn.2009.5270350","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE/IFIP International Conference on Dependable Systems &amp; Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6499999761581421}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W97539848"],"related_works":["https://openalex.org/W2010423808","https://openalex.org/W1981969630","https://openalex.org/W2931996793","https://openalex.org/W4205234238","https://openalex.org/W3148880067","https://openalex.org/W2788934790","https://openalex.org/W3167767780","https://openalex.org/W1988660452","https://openalex.org/W3043682580","https://openalex.org/W2941559775"],"abstract_inverted_index":{"Cloud":[0],"based":[1],"infrastructures":[2],"are":[3,84,112,178],"rapidly":[4],"becoming":[5],"a":[6,12,72,97],"destination":[7],"of":[8,14,33,35,39,41,101,105,126,131,171,176],"choice":[9],"to":[10,26,59,75,114,122,134,149],"host":[11],"variety":[13],"applications":[15,88,127],"ranging":[16],"from":[17],"high":[18],"availability":[19,81],"enterprise":[20],"services":[21,69],"and":[22,43,82,109,153,164],"online":[23],"TV":[24],"stations,":[25],"batch":[27],"oriented":[28],"scientific":[29],"computations.":[30],"With":[31],"investments":[32],"billions":[34],"dollars,":[36],"the":[37,94,120,140,169],"fortunes":[38],"dozens":[40],"companies,":[42],"major":[44],"research":[45],"initiatives":[46],"staked":[47],"on":[48,90],"its":[49],"success,":[50],"it":[51,62],"is":[52,57,63],"clear":[53,66],"that":[54,111,143,166],"cloud":[55,68,91,98,172],"computing":[56],"here":[58],"stay.":[60],"However,":[61],"not":[64],"yet":[65],"whether":[67],"can":[70,128],"be":[71],"dependable":[73],"alternative":[74],"dedicated":[76],"infrastructure.":[77,92],"On":[78,93],"one":[79],"hand,":[80,96],"privacy":[83],"serious":[85],"challenges":[86,163],"for":[87,116],"hosted":[89],"other":[95],"provider's":[99],"economies":[100],"scale":[102],"allow":[103],"levels":[104],"investment":[106],"in":[107,139,168],"redundancy":[108],"dependability":[110,161],"difficult":[113],"match":[115],"smaller":[117],"operators.":[118],"Furthermore,":[119],"ability":[121],"monitor":[123],"large":[124],"numbers":[125],"enable":[129],"ldquowisdom":[130],"crowdsrdquo":[132],"approaches":[133],"provide":[135],"enhanced":[136],"security":[137],"much":[138],"same":[141],"way":[142],"network":[144],"providers":[145],"have":[146],"been":[147],"able":[148],"do":[150],"with":[151],"worms":[152],"DDoS":[154],"attacks.":[155],"The":[156],"panel":[157],"will":[158],"discuss":[159],"new":[160],"related":[162],"opportunities":[165],"arise":[167],"context":[170],"computing,":[173],"some":[174],"examples":[175],"which":[177],"as":[179],"follows.":[180]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":11},{"year":2012,"cited_by_count":10}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
