Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2015, Article ID 213461, 11 pages
http://dx.doi.org/10.1155/2015/213461
Research Article

Assessment of In-Cloud Enterprise Resource Planning System Performed in a Virtual Cluster

1Department of Computer Science and Information Engineering, National University of Kaohsiung, Kaohsiung 81148, Taiwan
2Department of Marketing Management, Shu-Te University, Kaohsiung 82445, Taiwan

Received 11 June 2014; Accepted 10 August 2014

Academic Editor: Teen-Hang Meen

Copyright © 2015 Bao Rong Chang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Beloglazov and R. Buyya, “Energy efficient allocation of virtual machines in cloud data centers,” in Proceedings of the 10th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing (CCGrid '10), pp. 577–578, May 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. R. Laurikainen, J. Laitinen, P. Lehtovuori, and J. K. Nurminen, “Improving the efficiency of deploying virtual machines in a cloud environment,” in Proceedings of the International Conference on Cloud Computing and Service Computing (CSC '12), pp. 232–239, November 2012. View at Publisher · View at Google Scholar · View at Scopus
  3. S. Sotiriadis, N. Bessis, F. Xhafa, and N. Antonopoulos, “Cloud virtual machine scheduling: modelling the cloud virtual machine instantiation,” in Proceedings of the 6th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS '12), pp. 233–240, July 2012. View at Publisher · View at Google Scholar · View at Scopus
  4. Y.-S. Tianshe, J. Choi, Z. Xi, Y.-H. Sun, C.-S. Ouyang, and Y.-X. Huang, “Research of enterprise resource planning in a specific enterprise,” in Proceedings of the IEEE International Conference on Systems, Man and Cybernetics (SMC '06), pp. 418–422, Taipei, Taiwan, October 2006. View at Publisher · View at Google Scholar · View at Scopus
  5. R. A. de Carvalho and R. M. Monnerat, “Development support tools for enterprise resource planning,” IT Professional, vol. 10, no. 5, pp. 39–45, 2008. View at Publisher · View at Google Scholar · View at Scopus
  6. H. Wu, Y. Ding, L. Yao, and C. Winer, “Network security for virtual machine in cloud computing,” in Proceedings of the 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT '10), pp. 18–21, December 2010. View at Publisher · View at Google Scholar · View at Scopus
  7. B. R. Chang, H.-F. Tsai, and C.-M. Chen, “High-performed virtualization services for in-cloud enterprise resource planning system,” Journal of Information Hiding and Multimedia Signal Processing, vol. 5, no. 4, pp. 614–624, 2014. View at Google Scholar
  8. J.-G. Zhao, J.-C. Liu, J.-J. Fan, and J.-X. Di, “The security research of network access control system,” in Proceedings of the 1st ACIS International Symposium on Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce & Its Applications, and Embedded Systems (CDEE '10), pp. 283–288, Qinhuangdao, China, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  9. C. Metz, “AAA protocols: authentication, authorization, and accounting for the internet,” IEEE Internet Computing, vol. 3, no. 6, pp. 75–79, 1999. View at Publisher · View at Google Scholar · View at Scopus
  10. L. Zhang, A. G. Persaud, A. Johnson, and Y. Guan, “Detection of stepping stone attack under delay and chaff perturbations,” in Proceedings of the 25th IEEE International Performance, Computing, and Communications Conference (IPCCC '06), pp. 247–256, April 2006. View at Publisher · View at Google Scholar · View at Scopus
  11. H.-Y. Yang, L.-X. Xie, and F. Xie, “A new approach to network anomaly attack detection,” Fuzzy Systems and Knowledge Discovery, vol. 4, pp. 317–321, 2008. View at Google Scholar
  12. B. R. Chang, H.-F. Tsai, and C.-M. Chen, “Evaluation of virtual machine performance and virtualized consolidation ratio in cloud computing system,” Journal of Information Hiding and Multimedia Signal Processing, vol. 4, no. 3, pp. 192–200, 2013. View at Google Scholar · View at Scopus
  13. B. R. Chang, H.-F. Tsai, C.-M. Chen, Z.-Y. Lin, and C.-F. Huang, “Assessment of hypervisor and shared storage for cloud computing server,” in Proceedings of the 3rd International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA '12), pp. 67–72, September 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. K. E. Stewart, J. W. Humphries, and T. R. Andel, “An automated virtualization performance analysis platform,” Journal of Defense Modeling and Simulation, vol. 9, no. 3, pp. 257–265, 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. J. L. Wayman, “Biometrics in identity management systems,” IEEE Security & Privacy, vol. 6, no. 2, pp. 30–37, 2008. View at Publisher · View at Google Scholar · View at Scopus
  16. B. R. Chang, C.-F. Huang, H.-F. Tsai, and Z.-Y. Lin, “Rapid access control on ubuntu cloud computing with facial recognition and fingerprint identification,” Journal of Information Hiding and Multimedia Signal Processing, vol. 3, no. 2, pp. 176–190, 2012. View at Google Scholar · View at Scopus
  17. H. Imaizumi, T. Nagata, G. Kunito, K. Yamazaki, and H. Morikawa, “Power saving mechanism based on simple moving average for 802.3ad link aggregation,” in Proceedings of the IEEE Globecom Workshops, pp. 1–6, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  18. M. Doedt and B. Steffen, “Requirement-driven evaluation of remote ERP-system solutions: a service-oriented perspective,” in Proceedings of the 34th IEEE Software Engineering Workshop (SEW '11), pp. 57–66, June 2011. View at Publisher · View at Google Scholar · View at Scopus
  19. A. Elragal and M. E. Kommos, “In-house versus in-cloud ERP systems: a comparative study,” Journal of Enterprise Resource Planning Studies, vol. 2012, Article ID 659957, 13 pages, 2012. View at Publisher · View at Google Scholar
  20. C.-C. Chang, Y.-C. Huang, and H.-C. Tsai, “Design and analysis of chameleon hashing based handover authentication scheme for wireless networks,” Journal of Information Hiding and Multimedia Signal Processing, vol. 5, no. 1, pp. 107–116, 2014. View at Google Scholar · View at Scopus
  21. T.-H. Liu, Q. Wang, and H.-F. Zhu, “A Multi-function Password Mutual Authentication Key Agreement Scheme with privacy preserving,” Journal of Information Hiding and Multimedia Signal Processing, vol. 5, no. 2, pp. 163–174, 2014. View at Google Scholar