ANALYSIS OF VARIANT OF TWO-VERSION MULTI-MODULE WEB APPLICATION USING CLOUD SERVICES
Abstract
Keywords
Full Text:
PDF (Русский)References
AWS security best practices. Available at: https://aws.amazon.com/whitepapers/aws-security-best-practices/ (accessed 22.02.2020).
Microsoft Azure security best practices. Available at: https://docs.microsoft.com/en-us/azure/security/security-best-practices-and-patterns (accessed 22.02.2020).
Google cloud platform security best practices. Available at: https://cloud.google.com/docs/enterprise/best-practices-for-enterprise-organizations (accessed 22.02.2020).
Gorbenko, A. Analiz osobennostei sozdaniya i ekspluatatsii garantosposobnykh servis-orientirovannykh sistem [Analysis of dependable service-oriented systems development features]. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2013, no. 5(64), pp. 237-242.
Yastrebenetsky, M., Kharchenko, V. Nuclear Power Plant Instrumentation and Control Systems for Safety and Security. IGI Global, USA, 2014. 450 p.
Frolov, V., Frolov, O., Kharchenko, V. Classification of Diversity for Dependable and Safe Computing. COLINS, 2019. Available at: http://ceur-ws.org/Vol-2362/paper32.pdf (accessed 22.12.2019).
Randles, M., Lamb, D., Taleb-Bendiab, A. A Comparative Study into Distributed Load Balancing Algorithms for Cloud Computing. 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, Perth, WA, 2010, pp. 551-556. DOI: 10.1109/WAINA.2010.85.
Zhao, Q., Tan, Y. A Load Balancing Based Model for Dynamic Web Service Selection. Second International Symposium on Computational Intelligence and Design, Changsha, 2009, pp. 501-505. DOI: 10.1109/ISCID.2009.132.
Hong, Y. S., No, J. H., Kim, S. Y. DNS-based load balancing in distributed Web-server systems. The Fourth IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, and the Second International Workshop on Collaborative Computing, Integration, and Assurance (SEUS-WCCIA'06), Gyeongju, 2006, pp. 4. DOI: 10.1109/SEUS-WCCIA.2006.23.
Khwaja, S., Alshayeb, M. A framework for evaluating software design pattern specification languages. IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS), Niigata, 2013, pp. 41-45. DOI: 10.1109/ICIS.2013.6607814.
Alrouh, B., Ghinea, G. A Performance Evaluation of Security Mechanisms for Web Services. Fifth International Conference on Information Assurance and Security, Xi'an, 2009, pp. 715-718. DOI: 10.1109/IAS.2009.252.
You, Yu., Yuanyuan, Yang., Jian, Gu., Liang, Shen. Analysis and suggestions for the security of web applications. Proceedings of 2011 International Conference on Computer Science and Network Technology, Harbin, 2011, pp. 236-240. DOI: 10.1109/ICCSNT.2011.6181948.
Yadav, D., Gupta, D., Singh, D., Kumar, D., Sharma, U. Vulnerabilities and Security of Web Applications. 4th International Conference on Computing Communication and Automation (ICCCA), Greater Noida, India, 2018, pp. 1-5. DOI: 10.1109/CCAA.2018.8777558.
What Is Load Balancing. Available at: https://www.nginx.com/resources/glossary/load-balancing/ (accessed 20.02.2020).
Using nginx as HTTP load balancer Balancing. Available at: http://nginx.org/en/docs/http/load_balancing.html (accessed 21.02.2020).
Understanding software design patterns. Available at: https://opensource.com/article/19/7/understanding-software-design-patterns (accessed 24.02.2020).
Design Patterns. Available at: https://www.geeksforgeeks.org/design-patterns-set-1-introduction/ (accessed 21.02.2020).
Frolov, V. Analiz podkhodov k obespecheniyu bezopasnosti oblachnykh servisov [Analysis of approaches providing security of cloud services]. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2020, no.1(93), pp. 70-82. DOI: 10.32620/reks.2020.1.07.
Microsoft Azure marketplace. Available at: https://azuremarketplace.microsoft.com (accessed 22.02.2020).
DOI: https://doi.org/10.32620/reks.2020.2.07
Refbacks
- There are currently no refbacks.