-
2
-
-
21644433634
-
Xen and the art of virtualization
-
Bolton Landing, New York, USA
-
Barham P., Dragovic B., Fraiser K., Hand S., Harris T., Ho A., et al. Xen and the art of virtualization. Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP-19) (October 2003), Bolton Landing, New York, USA
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP-19)
-
-
Barham, P.1
Dragovic, B.2
Fraiser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
-
3
-
-
12344266250
-
-
Technical report no. 471, Cambridge University Computer Laboratory
-
Brady R., Anderson R., and Ball R. Murphy's law, the fitness of evolving species, and the limits of software reliability. Technical report no. 471 (1999), Cambridge University Computer Laboratory
-
(1999)
Murphy's law, the fitness of evolving species, and the limits of software reliability
-
-
Brady, R.1
Anderson, R.2
Ball, R.3
-
4
-
-
0030410990
-
A conservative theory for long-term reliability growth prediction
-
Bishop P., and Bloomfield R. A conservative theory for long-term reliability growth prediction. IEEE Transactions on Reliability 45 4 (December 1996)
-
(1996)
IEEE Transactions on Reliability
, vol.45
, Issue.4
-
-
Bishop, P.1
Bloomfield, R.2
-
5
-
-
43049155757
-
-
The Common Criteria Project Sponsoring Organizations. Common Criteria for information technology security evaluation. v. 3.1. rev. 1 ed.; September 2006a [also referred to as ISO 15408].
-
The Common Criteria Project Sponsoring Organizations. Common Criteria for information technology security evaluation. v. 3.1. rev. 1 ed.; September 2006a [also referred to as ISO 15408].
-
-
-
-
6
-
-
43049181124
-
-
The Common Criteria Project Sponsoring Organizations. Common methodology for information technology security evaluation. v. 3.1. rev. 1 ed.; September 2006b.
-
The Common Criteria Project Sponsoring Organizations. Common methodology for information technology security evaluation. v. 3.1. rev. 1 ed.; September 2006b.
-
-
-
-
7
-
-
0006029493
-
-
Addison-Wesley
-
Clements P., Bachmann F., Bass L., Garlan D., Ivers J., Little R., et al. Documenting software architectures: views and beyond (2003), Addison-Wesley
-
(2003)
Documenting software architectures: views and beyond
-
-
Clements, P.1
Bachmann, F.2
Bass, L.3
Garlan, D.4
Ivers, J.5
Little, R.6
-
8
-
-
43049177531
-
-
http://www.grammatech.com
-
-
-
-
13
-
-
0015482049
-
On the criteria to be used in decomposing systems into modules
-
Parnas D. On the criteria to be used in decomposing systems into modules. CACM 15 12 (December 1972)
-
(1972)
CACM
, vol.15
, Issue.12
-
-
Parnas, D.1
-
14
-
-
0021139353
-
-
Parnas D, Clements P, Weiss D. The modular structure of complex systems. In: Proceedings of the Seventh International Conference on Software Engineering, Orlando, FL, US; 1984.
-
Parnas D, Clements P, Weiss D. The modular structure of complex systems. In: Proceedings of the Seventh International Conference on Software Engineering, Orlando, FL, US; 1984.
-
-
-
-
15
-
-
48649091670
-
-
Randell B, Rushby J. Distributed secure systems: then and now. In: 23rd Annual Computer Security Applications Conference (ACSAC), Miami, FL, US; December 2007.
-
Randell B, Rushby J. Distributed secure systems: then and now. In: 23rd Annual Computer Security Applications Conference (ACSAC), Miami, FL, US; December 2007.
-
-
-
-
16
-
-
33750248123
-
-
Sailer R, Jaeger T, Valdez E, Cáceres R, Perez R, Berger S, et al. Building a MAC-based security architecture for the Xen open-source hypervisor. In: Proc. 21st Annual Computer Security Applications Conference, Tucson, Arizona, US; December 2005.
-
Sailer R, Jaeger T, Valdez E, Cáceres R, Perez R, Berger S, et al. Building a MAC-based security architecture for the Xen open-source hypervisor. In: Proc. 21st Annual Computer Security Applications Conference, Tucson, Arizona, US; December 2005.
-
-
-
|