Irina Astrova's research while affiliated with Tallinn University of Technology and other places

What is this page?


This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.

It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.

If you're a ResearchGate member, you can follow this page to keep up with this author's work.

If you are this author, and you don't want us to display this page anymore, please let us know.

Publications (3)


Integrating structured peer-to-peer networks into OM4SPACE project
  • Conference Paper

March 2013

·

12 Reads

Irina Astrova

·

Arne Koschel

·

Leonard Renners

·

[...]

·

In this paper, we provide an overview of the OM4SPACE project and different types of peer-to-peer (P2P) networks (both structured and unstructured), identify requirements for integrating P2P networks into the project and discuss which of the P2P networks meets these requirements best. We also propose an architecture for such integration.

Share

Automatic Scaling of Complex-Event Processing Applications in Eucalyptus

December 2012

·

22 Reads

·

1 Citation

Cloud computing is particularly well suited for applications with a variable workload such as, for example, complex-event processing (CEP) applications. Since these applications experience variability in utilization of resources, they are calling for an infrastructure that can dynamically scale according to the application demand. Scalability is one of the major advantages offered by IaaS (Infrastructure-as-a-Service) clouds. This gives rise to the idea to deploy CEP applications into IaaS clouds. But an IaaS cloud requires that CEP applications should be specifically designed for the cloud to benefit from its scalability. Thus, the problem is how to dynamically scale legacy and existing CEP applications (which have been around for years) with little or no changes to the application code.


Security of a Public Cloud

July 2012

·

24 Reads

·

6 Citations

This paper is about the current state of security in cloud computing. It shows some of the key benefits and the major drawbacks that come around with swapping out services and infrastructure to a public cloud. Based on these benefits and drawbacks, K.O. (knock-out) criteria will be identified, which can be seen as the minimum basis for secure cloud environment. Then a final conclusion about security in cloud computing will be given.

Citations (2)


... The idea that data is more than an arm's length away leaves them open to more breaches. Overseas cloud providers are not bound to the Privacy Act of 1993, which involves electronic data access, storage, and modification principles and regulations [15]. One of the major perceived benefits was raised by the businesses in the cloud explorer and cloud focused categories. ...

Reference:

An Incremental Model for Cloud Adoption: Based on a Study of Regional Organizations
Security of a Public Cloud
  • Citing Conference Paper
  • July 2012