博碩士論文 101423051 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:80 、訪客IP:18.117.8.63
姓名 王香婷(Hsian-ting Wang)  查詢紙本館藏   畢業系所 資訊管理學系
論文名稱 雲端服務能力成熟度模式之設計
(Cloud Service Capability Maturity Model Design)
相關論文
★ 專案管理的溝通關鍵路徑探討─以某企業軟體專案為例★ 運用並探討會議流如何促進敏捷發展過程中團隊溝通與文件化:以T銀行系統開發為例
★ 專案化資訊服務中人力連續派遣決策模式之研究─以高鐵行控資訊設備維護為例★ 以組織正義觀點介入案件指派決策之研究
★ 應用協調理論建立系統軟體測試中問題改善之協作流程★ 應用案例式推理於問題管理系統之研究 -以筆記型電腦產品為例
★ 運用限制理論於多專案開發模式的人力資源配置之探討★ 應用會議流方法於軟體專案開發之個案研究:以翰昇科技公司為例
★ 多重專案、多期再規劃的軟體開發接案決策模式:以南亞科技資訊部門為例★ 會議導向敏捷軟體開發及系統設計:以大學畢業專題為例
★ 一種基於物件、屬性導向之變更影響分析方法於差異化產品設計★ 會議流方法對大學畢業專題的團隊合作品質影響之實驗研究
★ 實施敏捷式發展法於大學部畢業專題之 行動研究 – 以中央大學資管系為例★ 建立一個用來評核自然語言需求品質的線上資訊系統
★ 結合本體論與模糊分析網路程序法於軟體測試之風險與風險關聯辨識★ 在軟體反向工程中針對UML結構模型圖之線上品質評核系統
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 隨著社會的進步及市場快速的變化,許多雲端服務業者(Cloud Service Provider)投入雲端服務市場建置雲端服務環境。然而,在如此競爭激烈的雲端服務(Cloud Service)市場中,許多的雲端服務業者宣稱自己提供雲端服務給予顧客。但是,雲端服務的提供會因為服務的範圍、服務的層次與深度的不同,而造成雲端服務提供的深化程度有所不同。由此可以得知,雲端服務市場中尚未有一個清楚表述雲端服務業者之服務提供層級的規範依據。
如果雲端服務建置的改善(Improve)與優化(Enhance)可以著手於流程,將可替雲端服務業者持續及提升雲端服務水準。因此本研究嘗試同樣運用在流程改善及優化的CMM(Capability Maturity Model)作為本研究提出Cloud Service-CMM(Cloud Service-Capability Maturity Model,CS-CMM)的模型基礎。此模型藉由流程的觀點衡量雲端服務的流程領域(Process Area)進行雲端服務流程改善,並且評估雲端服務業者的雲端服務成熟度(Cloud Service Maturity Level)與雲端服務能力度(Cloud Service Capability Level)。再透過制度化(Institutionalization)確保雲端服務業者之各項流程能夠長遠、並且穩定的實施,不會因為不同的服務提供人員、時間等因素,而在執行相同的事物上有所偏差。最後,為了不讓雲端服務業者只專注從事流程的標準化,而忽略創新服務的提供,因此加入永續改善的觀點至CS-CMM中,讓雲端服務業者得以持續優化雲端服務流程。
摘要(英) Due to the rapid advancement of technology, more and more cloud service providers begin to build their cloud service environment in the cloud service market. In the intense competition of the market, every cloud service providers claim that they deliver an up to par service to the customer. However, the overall level of the service differs by the scope and depth of the service provided. At present, the cloud service market still don’t have a clear model to define the level of service of the cloud service providers.
Cloud service provider will be able to increase the level of their cloud service by focusing on the improvement and enhancement of their process. Thus we attempt to apply the CMM (Capability Maturity Model) of process focus as the fundamental of our Cloud Service–CMM (Cloud Service–Capability Maturity Model, CS-CMM). In this research, we design and develop process areas (PAs) which are significantly related to cloud service to improve and evaluate the Cloud Service Maturity Level (CSML) and Cloud Service Capability Level (CSCL) of cloud service provider. Furthermore, institutionalization can also ensure the implementation and stability of processes in the long run. Lastly, we also add sustainable improvement in CS-CMM to avoid overlooking new and innovative services.
關鍵字(中) ★ 雲端服務
★ 能力成熟度模式
★ 制度化
★ 流程改善
★ 流程優化
★ 永續改善
關鍵字(英) ★ Cloud service
★ Capability Maturity Model (CMM)
★ Institutionalization
★ Improve
★ Enhance
★ Sustainable improvement
論文目次 摘要 i
Abstract ii
目錄 iv
圖目錄 vi
表目錄 vii
第一章 緒論 1
1-1 研究背景 1
1-2 研究動機與問題 1
1-3 研究目的 2
1-4 研究假設 3
1-5 論文架構 4
第二章 文獻探討 5
2-1 雲端服務 5
2-2 CMM/CMMI 7
2-2-1 CMM/CMMI介紹 8
2-2-2 CMMI-SVC 10
2-3 雲端服務能力成熟度模型相關研究 12
第三章 研究方法 18
3-1 模式特色 18
3-2 名詞定義與概念說明 19
3-2-1 雲端服務能力成熟度模型表述方式 19
3-2-2 等價對應(Equivalent Staging) 21
3-2-3 雲端服務流程領域之分類 22
3-2-4 PA、SG、SP、GG、GP及制度化(Institutionalization) 23
3-3 流程領域設計 23
3-3-1 成熟度內含之各項雲端服務流程領域雛形 23
3-3-2 雲端服務流程領域之特定目標及特定方法 26
3-4 永續化之設計 39
3-5 模式架構 41
第四章 系統展示 45
4-1 雲端服務關鍵人員 45
4-2 系統架構及使用情境說明 46
4-2-1 功能項目—模式目的 47
4-2-2 功能項目—模式架構 47
4-2-3 功能項目—表述方式 48
4-2-4 功能項目—流程改善指引 49
第五章 研究討論 55
5-1 模式驗證 55
5-1-1 問卷說明 55
5-1-2 統計分析 56
5-2 模式比較 59
5-3 研究假設 62
5-4 研究限制 63
第六章 結論 65
6-1 研究貢獻 65
6-2 未來展望 66
參考文獻 68
附錄 75
參考文獻 [1] 中田敦, 小林雅一, 石田愛, 普本直彥, 高橋秀和, 松尾貴史, 岩上由高, 酒井達明, 西片公一, 森正弥, 太田一樹. (2010). 雲端運算大解密. (鄧瑋敦, 譯者) 台北市: 城邦文化.
[2] 文傑, 陳小軍, 吳玉民, 熊潔, 李平, 米凱, 喬立, 朱濤, 黃薇. (2012). 雲端運算與SaaS佈署應用. 台北市: 上奇資訊股份有限公司.
[3] 方國偉. (2012). 解析 Microsoft Windows Azure 雲端運算平台. 台北市: 上奇資訊股份有限公司.
[4] 王鵬. (2009). 走進雲端運算. 台北市: 佳魁資訊股份有限公司.
[5] 王鵬. (2010). 雲端運算的關鍵技術與應用實例. 台北市: 佳魁資訊股份有限公司.
[6] 吳統雄. (1990). 電話調查: 理論與方法. 台北: 聯經. 頁145.
[7] 廖文良. (2009). 雲端運算. 台北市: 碁峰資訊股份有限公司.
[8] 陳瀅. (2010). 雲端策略. 台北市: 天下雜誌.
[9] 葉世綺, 趙喆, & 王輝. (2012年1月). 基於CMM/CMMI的雲計算能力評價研究. 計算器應用研究, 29(1), 頁 107-111.
[10] Al Falasi, A., & Serhani, M. A. (2011). A Framework for SLA-based cloud services verification and composition. 2011 International Conference on Innovations in Information Technology (IIT) (pp. 287-292). IEEE.
[11] Alhamad, M., Dillon, T., & Chang, E. (2010). Conceptual SLA framework for cloud computing. 4th IEEE International Conference on Digital Ecosystems and Technologies (pp. 606 - 610). IEEE.
[12] Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., & Zaharia, M. (2010, 4). A view of cloud computing. Communications of the ACM, 53(4), 50-58.
[13] Basu, S., Graupner, S., Pruyne, J., & Singhal, S. (2010). Control plane integration for cloud services. Proceedings of the 11th International Middleware Conference Industrial track (pp. 29-34). Association for Computing Machinery.
[14] Behrendt, M., Glasner, B., Kopp, P., Dieckmann, R., Breiter, G., Pappe, S., Kreger, H., Arsanjani, A. (2011). IBM Cloud Computing Reference Architecture 2.0. IBM.
[15] Bisong, A., & Rahman, S. M. (2011). An Overview of The Security Concerns in Enterprise Cloud Computing. International Journal of Network Security & Its Applications, 3(1), pp. 30-45.
[16] Cancian, M. H., Hauck, J. C., Wangenheim, C. G., & Rabelo, R. J. (2010). Discovering Software Process and Product Quality Criteria in Software as a Service. Product-Focused Software Process Improvement (pp. 14). Springer Berlin Heidelberg.
[17] Cayirci, E., Rong, C., Huiskamp, W., & Verkoelen, C. (2009). Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges. CloudCom 2009 (pp. 57-68). Beijing, China: Springer Berlin Heidelberg.
[18] Creese, S., Hopkins, P., Pearson, S., & Shen, Y. (2009). Data Protection-Aware Design for Cloud Services. Cloud Computing (pp. 119 - 130). Springer Berlin Heidelberg.
[19] Delone, William H., & Mclean, Ephraim R. (2003). The DeLone and McLean Model of Information Systems Success: A Ten-Year Update. Journal of Management Information Systems, 19(4), pp.9-30.
[20] Dikaiakos, M. D., Pallis, G., Katsaros, D., Mehra, P., & Vakali, A. (2009, 9). Cloud Computing: Distributed Internet Computing for IT and Scientific Research. Internet Computing, IEEE, 13(5), pp. 10-13.
[21] Dowell, S., Barreto, A., Michael, J. B., & Shing, M. T. (2011). Cloud to Cloud Interoperability. 2011 6th International Conference on System of Systems Engineering (pp. 258-263). Albuquerque, NM: Institute of Electrical and Electronics Engineers.
[22] Durkee, D. (2010, 5). Why Cloud Computing Will Never Be Free. Communications of the ACM, 53(5), pp. 62-69.
[23] Espadas, J., Concha, D., & Molina, A. (2008). Application Development over Software-as-a-Service platforms. The Third International Conference on Software Engineering Advances, 2008. ICSEA ′08 (pp. 97-104). IEEE.
[24] Forrester, E. (2011, 4). CMMI for Services (CMMI-SVC): Agile Strategy.
[25] Forrester, E. (2012, 2). CMMI for Services (CMMI-SVC): Using multiple models in mixed.
[26] Foster, I., Zhao, Y., Raicu, I., & Lu, S. (2008). Cloud Computing and Grid Computing 360-Degree Compared. Grid Computing Environments Workshop, 2008. GCE ′08, (pp. 1-10).
[27] Haq, I. U., Brandic, I., & Schikuta, E. (2010). SLA Validation in Layered Cloud Infrastructures. Economics of Grids, Clouds, Systems, and Services (pp. 153-164). Springer Berlin Heidelberg.
[28] Hollenbach, C. R., & Buteau, B. (2007, 3). CMMI for Services: Introducing the CMMI for Service Constellation.
[29] Iosup, A., & Epema, D. (2006). GRENCHMARK: A Framework for Analyzing, Testing, and Comparing Grids., (pp. 313 - 320).
[30] Iosup, A., Ostermann, S., Yigitbasi, M. N., Prodan, R., Fahringer, T., & Epema, D. H. (2011, 6). Performance Analysis of Cloud Computing Services for Many-Tasks Scientific Computing. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 22(6), pp. 931 - 945.
[31] JansenWayne, & GranceTimothy. (2011). Guidelines on Security and Privacy in Public Cloud Computing. National Institute of Standards and Technology .
[32] JuranM.Joseph, & GodfreyBlantonA. (1999). Juran′s Quality Handbook.
[33] Khajeh-Hosseini, A., Greenwood, D., & Sommerville, I. (2010). Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS. 2010 IEEE 3rd International Conference on Cloud Computing (pp. 450-457). Miami, FL: IEEE.
[34] Khalidi, Y. A., & Microsoft. (2011, 3). Building a Cloud Computing Platform for New Possibilities. IEEE Computer Society, 44(3), pp. 29-34.
[35] Leitner, P., Inzinger, C., Hummer, W., Satzger, B., & Dustdar, S. (2012). Application-Level Performance Monitoring of Cloud Services Based on the Complex Event Processing Paradigm. 2012 5th IEEE International Conference on Service-Oriented Computing and Applications (SOCA) (pp. 1-8). IEEE.
[36] Liu, F., Guo, W., Zhao, Z. Q., & Chou, W. (2010). SaaS Integration for Software Cloud. 2010 IEEE 3rd International Conference on Cloud Computing (pp. 402-409). Miami, FL: Institute of Electrical and Electronics Engineers.
[37] Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Badger, L., & Leaf, D. (2011). NIST Cloud Computing Reference Architecture. National Institute of Standards and Technology.
[38] Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011, 4). Cloud computing — The business perspective. Decision Support Systems, 51(1), pp. 176-189.
[39] Mattoon, S., Hensle, B., & Baty, J. (2011). Cloud Computing Maturity Model – Guiding Success with Cloud. Oracle Corporation.
[40] Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing (Draft). National Institute of Standards and Technology.
[41] Meng, S., & Liu, L. (2013A, 9). Enhanced Monitoring-as-a-Service for Effective Cloud Management. IEEE TRANSACTIONS ON COMPUTERS, 62(9), pp. 1705 - 1720.
[42] Meng, S., & Liu, L. (2013B). Monitoring-as-a-service in the cloud: spec phd award (invited abstract). ICPE ′13 Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering (pp. 373-374). ACM.
[43] Nunally, J.C ., & Bernstein, I. H. (1978). Psychometric theory.
[44] Ostermann, S., Iosup, A., Yigitbasi, N., Prodan, R., Fahringer, T., & Eperna, D. (2010). A Performance Analysis of EC2 Cloud Computing Services for Scientific Computing. Cloud Computing (pp. 115-131). Springer-Verlag Berlin Heidelberg.
[45] PalsonKennedy, R., & Gopal, T. (2010). Assessing the risks and opportunities of Cloud Computing — Defining identity management systems and maturity models. Trendz in Information Sciences & Computing (TISC) (pp. 138 - 142). IEEE.
[46] Papazoglou, M. P., & van den Heuvel, W.-J. (2011). Blueprinting the Cloud. IEEE Internet Computing, 15(6), pp. 74-79.
[47] Parasuraman, A., Zeithaml, V. A., Berry, L. L. (1985). A Conceptual Model of Service Quality and Its Implications for Future Research. Journal of Marketing, 49(4), pp.41-50.
[48] Paulk, M. C., Curtis, B., Chrissis, M. B., & Weber, C. V. (1993, 7). Capability maturity model, version 1.1. Software, IEEE, 10(4), pp. 18-27.
[49] Pearson, S., & Benameur, A. (2010). Privacy, Security and Trust Issues Arising from Cloud Computing. 2nd IEEE International Conference on Cloud Computing Technology and Science, (pp. 693 - 702).
[50] Petcu, D., Macariu, G., Panica, S., & Crăciun, C. (2013, 8). Portable Cloud Applications—from Theory to Practice. Future Generation Computer Systems, pp. 1417-1430.
[51] Rahumed, A., Chen, H. C., Tang, Y., Lee, P. P., & Lui, J. C. (2011). A Secure Cloud Backup System with Assured Deletion and Version Control. 2011 International Conference on Parallel Processing Workshops (pp. 160-167). IEEE.
[52] Rehman, Z. u., Hussain, O. K., Parvin, S., & Hussain, F. K. (2012). A Framework for User Feedback Based Cloud Service Monitoring. 2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems (pp. 257 - 262). IEEE.
[53] Sabatier, P.A. (1986,5). Top-Down and Bottom-Up Approaches to Implementation Research: a Critical Analysis and Suggested Synthesis. Journal of Public Policy, 6(1), pp.21-48.
[54] Sakka, M. A., Defude, B., & Tellez, J. (2010). Document Provenance in the Cloud: Constraints and Challenges. Networked Services and Applications - Engineering, Control and Management (pp. 107-117). Springer Berlin Heidelberg.
[55] SEI (Software Engineering Institute). (2010A). CMMI for Development, Version 1.3. Software Engineering Institute, Carnegie Mellon University.
[56] SEI (Software Engineering Institute). (2010B). CMMI for Services, Version 1.3. Software Engineering Institute, Carnegie Mellon University.
[57] Stuart, F. I., & Tax, S. S. (1996). Planning for service quality: an integrative approach. International Journal of Service Industry Management, 7(4), pp. 58-77.
[58] Subashini, S., & Kavitha, V. (2011, 1). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), pp. 1-11.
[59] Takabi, H., Joshi, J. B., & Ahn, G.-J. (2010, 12). Security and Privacy Challenges in Cloud Computing Environments. Security & Privacy, IEEE, 8(6), pp. 24 - 31.
[60] Vaquero, L. M., Rodero-Merino, L., Caceres, J., & Lindner, M. (2009, 1). A Break in the Clouds: Towards a Cloud Definition. ACM SIGCOMM Computer Communication Review, 39(1), pp. 50-55.
[61] Wei, Y., & Blake, M. B. (2010, 11). Service-Oriented Computing and Cloud Computing: Challenges and Opportunities. Internet Computing, IEEE, 14(6), pp. 72-75.
[62] Wood, T., Cecchet, E., Ramakrishnan, K., Shenoy, P., Merwe, J. v., & Venkataramani, A. (2010). Disaster Recovery as a Cloud Service: Economic Benefits & Deployment Challenges. In 2nd USENIX Workshop on Hot Topics in Cloud Computing.
[63] Yigitbasi, N., Iosup, A., Epema, D., & Ostermann, S. (2009). C-Meter: A Framework for Performance Analysis of Computing Clouds. 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, (pp. 472 - 477).
[64] Zhang, L.-J., & Zhou, Q. (2009). CCOA: Cloud Computing Open Architecture. 2009 IEEE International Conference on Web Services (pp. 607-616). Los Angeles, CA: IEEE.
[65] Zhang, Z., Wu, C., & Cheung, D. W. (2013, 3). A survey on cloud interoperability: taxonomies, standards, and practice. ACM SIGMETRICS Performance Evaluation Review, 40(4), pp. 13-22.
指導教授 陳仲儼 審核日期 2014-7-9
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明