Citations - TannerWeinacker/Capstone GitHub Wiki

Application Deployment Strategies for Reducing the Cold Start Delay of AWS Lambda

  1. R. Pathak and P. Khandelwal, "A Model for Hybrid Cloud Integration: With a Case Study for IT Service Management (ITSM)," in 2017 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), Bangalore, India, 2017 pp. 113-118.

This article will provide some insight on doing a cold start for classes or other uses

Cloudify the Curriculum

  1. M. Soltys, "Cloudifying the Curriculum with AWS," in 2021 IEEE Frontiers in Education Conference (FIE), Lincoln, NE, USA, 2021 pp. 1-7.

This article is about taking a classroom setting and integrating it with the cloud. Some do's and don'ts

Emerging Hybrid cloud patterns

  1. D. Linthicum, "Emerging Hybrid Cloud Patterns" in IEEE Cloud Computing, vol. 3, no. 01, pp. 88-91, 2016.

Some patterns to look at, potentially insight on things to consider when setting up a hybrid environment

Automatic minimization of Execution Costs of SPITS programs in AWS

  1. N. Okita, C. Rodamilans, T. Coimbra, M. Tygel and E. Borin, "Automatic Minimization of Execution Costs of SPITS Programs in AWS," in 2018 Symposium on High Performance Computing Systems (WSCAD), São Paulo, Brazil, 2018 pp. 101-107.

We will have to plan through the budgeting so getting some insight on the cost or how others have set up the environment will be helpful

Exertion-Based Billing for Cloud Storage Access

  1. Wachs, Matthew, Lianghong Xu, Arkady Kanevsky, and Gregory R. Ganger. “Exertion-Based Billing for Cloud Storage Access.” In Proceedings of the 3rd USENIX Conference on Hot Topics in Cloud Computing, 7. HotCloud’11. USA: USENIX Association, 2011.

Another billing source to reference

Access Control Models for Virtual Object Communication in Cloud-Enabled IoT

  1. Alshehri, Asma, and Ravi Sandhu. “Access Control Models for Virtual Object Communication in Cloud-Enabled IoT,” 16–25. IEEE Computer Society, 2017. https://doi.org/10.1109/IRI.2017.60

Looking into some of the options to secure access for AWS

AWS security best practices

  1. Todorov, Dob, and Yinal Ozkan. "AWS security best practices." Amazon Web Services [Online]. Available from: http://media. amazonwebservices. com/AWS_Security_Best_Practices. p df (2013).

A reference to some of the most used and best practices for security

AWS Security CookBook

  1. Kanikathottu, Heartin. AWS Security Cookbook: Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS. Packt Publishing Ltd, 2020

Another reference to security practices for AWS

Cost-optimnal AWS Deployment Configuration for Containerized Event-driven Systems

  1. Sisák, Martin. Cost-optimal AWS Deployment Configuration for Containerized Event-driven Systems. Diss. Masaryk University, 2021.

Attempting to minimize the cost will take a lot of research, so this another resource to look reference

Configuration Method of AWS Security Architecture for Cloud Service

  1. Park, Se-Joon, Yong-Joon Lee, and Yeon-Chool Park. "Configuration Method of AWS Security Architecture for Cloud Service." Journal of Convergence for Information Technology 11.7 (2021): 7-13.

How to actually configure and set up a hybrid model for AWS.