5G | The Next (5th) Generation |
ACID | Atomicity, Consistency, Isolation, Durability |
ACL | Access Control List |
AI | Artificial Intelligence |
AIIOT | Artificial Intelligence and Internet of Things |
AKS | Azure Kubernetes Service |
ALB | Adaptive Load Balancing |
AMQP | Advanced Message Queuing Protocol |
ANSI | American National Standards Institute |
API | Application Programming Interface |
ARP | Address Resolution Protocol |
ARPA | Advanced Research Projects Agency |
AS | Autonomous System |
ATL | Atlas Transformation Language |
AWS | Amazon Web Services |
BGP | Border Gateway Protocol |
BSM | Business Service Management |
BSP | Business Service Provider |
BSON | Binary JSON |
CAA | Cloud Application Architecture |
CAM | Content Addressable Memory |
CAP | Consistency, Availability, and Partition |
CapEx | Capital Expenditure |
CC | Cluster Controller |
CDP | Continuous Data Protection |
CDS | Content Delivery Servers |
CCE | Cloud Computing Environment |
CERN | European Organization for Nuclear Research |
CFI | Control Flow Integrity |
CIDR | Classless Inter-Domain Routing |
CIS | Cloud Information Service |
CLC | Cloud Controller |
CMR | Customer Relationship Management |
CODINE | Computing in Distributed Networked Environments |
COI | Community of Interest |
CPA | Cloud Platform Architecture |
CPU | Central Processing Unit |
CSA | Cloud Protection Alliance |
CSLB | Central Scheduler Load Balancing |
CSP | Cloud Service Provider |
DAM | Database Activity Monitoring |
DaaS | Database as a Service |
DBMS | Database Management System |
DCE | Data Center Efficiency |
DC | Distributed Computing |
DDoS | Distributed Denial of Service |
DoS | Denial of Service |
DHCP | Dynamic Host Configuration Protocol |
DLP | Data Loss Prevention |
DNS | Domain Name Server |
DNSSEC | Domain Name System Security Extensions |
DPM | Distributed Power Management |
DRS | Distributed Resource Scheduler |
DSM | Distributed Shared Memory |
DVFS | Dynamic Frequency Voltage Scaling |
ECMP | Equal-Cost Multi-Path |
EC2 | Elastic Compute Cloud |
ECN | Explicit Congestion Notification |
EPPKS | Efficient Privacy Preserving Keyword Search Scheme |
FAM | File Activity Monitoring |
FGBI | Fine-Grained Block Identification |
FCAPS | Fault, Configuration, Account, Performance, Security |
FC | Fiber Channel |
FC-SAN | FC-Based Storage Area Networks |
GA | Genetic Algorithm |
GAE | Google App Engine |
GVMI | Generic Virtual Machine Image |
GOC | Green Open Cloud |
GPS | Global Positioning System |
GPLv2 | General Public License |
GUI | Graphical User Interface |
HA | Homomorphic Authenticator |
HDFS | Hadoop Distributed File System |
HMAC | Hash Message Authentication Code |
HIPS | Host Intrusion Prevention System |
HME | Hypervisor Monitoring Environment |
HPC | Hardware Performance Computing |
HTTP | Hypertext Transfer Protocol |
HVM | Hardware-Assisted Virtual Machine |
IaaS | Infrastructure as a Service |
IDC | international Information Enterprise |
IDS | Intrusion Detection System |
IDS/IPS | Intrusion Detection System/Intrusion Prevention System |
IMA | Integrity Management Architecture |
IoT | Internet of Things |
IP | Internet Protocol |
IPsec | IP-Level Security |
IPS | Intrusion Prevention System |
IRM | In-Lined Reference Monitors |
ISA | Instruction Set Architecture |
IT | Information Technology |
I/O | Input/Output |
JSON | JavaScript Object Notation |
KVM | Kernel-Based Virtual Machine |
KBA | Knowledge-Based Answers/Questions |
LAN | Local Area Network |
LGPL | Lesser General Public License |
LLFC | Link Layer Flow Control |
LLM | Lightweight Live Migration |
LVM | Logical Volume Manager |
LVMM | Live Virtual Machine Migration |
MaaS | Model as a Service |
MAC | Media Access Control |
MCC | Mobile Cloud Computing |
MFA | Multi-Factor Authentication |
MiTM | Man-in-the-Middle Attack |
MP | Microprocessor |
MPI | Message Passing Interface |
MPLS | Multi-Protocol Label Switching |
MSN | Mobile Social Networking |
MVCC | Multi-Version Concurrency Control |
NAS | Network-Attached Storage |
NAC | Network Access Control |
NC | Node Controller |
NFS | Network File Server |
NSF | National Science Foundation |
NSFC | National Natural Science Foundation of China |
NIPS | Network Intrusion Prevention System |
NIC | Network Interface Controller |
NoSQL | Not-only-SQL |
NOW | Networks of Workstations |
NICs | Network Interface Cards |
NRDC | Natural Resources Defense Council |
OCR | Optical Character Recognition |
OLTP | Online Transaction Processing |
ONF | Open Networking Foundation |
OS | Operating System |
OSG | Object Storage Gateway |
OSP | Object Storage Provider |
OVS | Open vSwitch |
P2P | Peer-to-Peer |
PaaS | Platform as a Service |
PAP | Policy Access Points |
PC | Personal Computer |
PCB | Process Control Block |
PDT | Performance Degradation Time |
PDP | Policy Decision Points |
PEP | Policy Enforcement Points |
PKI | Public Key Infrastructure |
PMC | Performance Monitoring Counters |
POR | Proof of Retrievability |
POC | Proof of Concept |
PPW | Performance Per Watt |
PUE | Power Usage Effectiveness |
PVM | Parallel Virtual Machine |
PV | Public Verifiability |
QoS | Quality of Service |
RaaS | Resources as a Service |
RBAC | Role-Based Access Control |
RDBMS | Relationship Database Management System |
RDPC | Remote Data Processing Scheme |
RDS | Relational Database System |
RED | Random Early Detection |
RLE | Run-Length Encoding |
RPC | Remote Procedure Call Protocol |
RPM | Red Hat Package Manager |
RSA | Rivest–Shamir–Adleman |
RTT | Round-Trip Time |
S3 | Simple Storage Service |
SAN | Storage Area Network |
SaaS | Software as a Service |
SAML | Security Assertion Markup Language |
SC | Storage Controller |
SDN | Software-Defined Networks |
SECaaS | Security as a Service |
SEaaS | Sensor Event as a Service |
SFI | Software Fault Isolation |
SIEM | Security Information and Event Management |
SLA | Service-Level Agreements |
SMC | Secure Multi-Party Computation |
SME | Small Medium Enterprise |
SMP | Symmetric Multi-Processing |
SOAP | Simple Object Access Protocol |
SOA | Service-Oriented Architecture |
SPT | Shadow Page Table |
SQL | Structured Query Language |
SSC | SQL Server Compact |
SSH | Password-Based Auth |
SSI | Single System Image |
STP | Spanning Tree Protocol |
TCSEC | Trusted Computer System Evaluation Criteria |
TDS | Tabular Data Stream |
TPA | Third-Party Auditor |
TPAS | Third-Party Auditing Service |
TPM | Trusted Platform Module |
TTP | Trusted Third Party |
TCG | Trusted Computing Group |
TCP/IP | Transmission Control Protocol/Internet Protocol |
UDB | User Database |
UFS | User-Facing Service |
VDCs | Virtual Data Centers |
VDI | Virtual Desktop Infrastructure |
VEE | Virtual Environment Extension |
VLAN | Virtual Local Area Network |
VLB | Valiant Load Balancing |
VM | Virtual Machine |
VMLM | Virtual Machine Live Migration |
VMM | Virtual Machine Migration |
VO | Virtual Organization |
VPC | Virtual Predict Checkpointing |
VPN | Virtual Private Network |
WaaS | Workflow as a Service |
WAN | Wide Area Network |
WSN | Wireless Sensor Network |
WWS | Writable Working Set |
WWW | World Wide Web |
XSS | Cross-Site Scripting |
XML | Extensible Markup Language |
YARN | Yet Another Resource Negotiator |