Literature
The course literature is comprised of selected research papers outlining the main topics of the course.
Please note that the course literature covers large parts but not all of the course content. Some material is only covered in lectures, and other parts are only covered in the course literature.
Papers
NOTE: More papers may be added as the course progresses.
Intensive Reading
RESTful Web Services vs. "Big" Web Services: Making the Right Architectural DecisionHandbook of Applied Cryptography, Chapter 1 (webpage)
Cloud Computing and Grid Computing 360-Degree Compared
BOINC: A System for Public-Resource Computing and Storage
A View of Cloud Computing
A Survey and Comparison of Peer-to-Peer Overlay Network Schemes
Extensive Reading
Why is the Web Loosely Coupled? A Multi-Faceted Metric for Service Design
Privacy and Authentication: An Introduction to Cryptography
New Directions in Cryptography
Ten Risks of PKI: What You’re not Being Told about Public Key Infrastructure
Self-Study Course in Block Cipher Cryptanalysis
Next generation security for wireless: elliptic curve cryptography
High-speed hardware implementations of Elliptic Curve Cryptography: A survey
Strong Authentication for RFID Systems Using the AES Algorithm
Mechanisms for High Throughput Computing
Condor - A Hunter of Idle Workstations
SoftUDC: A Software-Based Data Center for Utility Computing
1000 islands: an integrated approach to resource management for virtualized data centers
Cloud-Scale Resource Management: Challenges and Techniques
The Vision of Autonomic Computing
The Future of Cloud Computing - Opportunities for European Cloud Computing Beyond 2010 (sections II-III)
Advances in Clouds: Research in Future Cloud Computing (intro + sections I-III)
Auto-scaling Techniques for Elastic Applications in Cloud Environments
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications
Privacy-Preserving P2P Data Sharing with OneSwarm
Paxos Made Live - An Engineering Perspective
Tahoe – The Least-Authority Filesystem
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
Incentives Build Robustness in BitTorrent
Do incentives build robustness in BitTorrent?
Useful links
Axis2 API documentationRestlet API documentation