-
2
-
-
4544249464
-
-
iShare
-
iShare. http://www.ecn.purdue.edu/ParaMount/iShare.
-
-
-
-
3
-
-
4544354513
-
Know your enemy: Learning with user-mode linux
-
Know Your Enemy: Learning with User-Mode Linux. Honeynet Project White Paper, http://project.honeynet.org/papers/uml.
-
Honeynet Project White Paper
-
-
-
4
-
-
4544243000
-
-
Snort, http://www.snort.org.
-
-
-
-
5
-
-
4544378429
-
-
The In-VIGO Project. http://invigo.acis.ufl.edu/docs/aboutInVigo.html.
-
-
-
-
6
-
-
4544220031
-
-
VMWare. http://www.vmware.com.
-
-
-
-
8
-
-
84891956506
-
Oceano: SLA based management of a computing utility
-
May
-
K. Appleby, S. Fakhouri, L. Fong, G. Goldszmidt, and M. Kalantar. Oceano: SLA based Management of a Computing Utility. IFIP/IEEE Intl. Symp. on Integrated Network Management, May 2001.
-
(2001)
IFIP/IEEE Intl. Symp. on Integrated Network Management
-
-
Appleby, K.1
Fakhouri, S.2
Fong, L.3
Goldszmidt, G.4
Kalantar, M.5
-
9
-
-
0037517134
-
DOS-resistant authentication with client puzzles
-
T. Aura, P. Nikander, and J. Leiwo. DOS-resistant authentication with client puzzles. Security Protocols Workshop 2000, LNCS, 2133, 2000.
-
(2000)
Security Protocols Workshop 2000, LNCS
, vol.2133
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
10
-
-
21644433634
-
Xen and the art of virtualization
-
Oct.
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the Art of Virtualization. 19th ACM Symposium on Operating Systems Principles (SOSP 2003), Oct. 2003.
-
(2003)
19th ACM Symposium on Operating Systems Principles (SOSP 2003)
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
14
-
-
11844249640
-
Re-virt: Enabling intrusion analysis through virtual-machine logging and replay
-
Dec.
-
G. Dunlap, S. King, S. Cinar, M. Basrai, and P. Chen. Re-Virt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay. USENIX OSDI 2002, Dec. 2002.
-
(2002)
USENIX OSDI 2002
-
-
Dunlap, G.1
King, S.2
Cinar, S.3
Basrai, M.4
Chen, P.5
-
15
-
-
85180753454
-
User-level infrastructure for system call interposition: A platform for intrusion detection and confinement
-
K. Jain and R. Sekar. User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement. Network and Distributed Systems Symposium (NDSS 2000), 2000.
-
(2000)
Network and Distributed Systems Symposium (NDSS 2000)
-
-
Jain, K.1
Sekar, R.2
-
16
-
-
4544272226
-
SODA: A service-on-demand architecture for application service hosting utility platforms
-
June
-
X. Jiang and D. Xu. SODA: a Service-On-Demand Architecture for Application Service Hosting Utility Platforms. IEEE HPDC-12, June 2003.
-
(2003)
IEEE HPDC-12
-
-
Jiang, X.1
Xu, D.2
-
19
-
-
4544299034
-
-
ghttpd
-
G. Owen, ghttpd. http://gaztek.sourceforge.net/ghttpd.
-
-
-
Owen, G.1
-
20
-
-
27144435178
-
Towards virtual networks for virtual machine grid computing
-
May
-
A. Sundararaj and P. Dinda. Towards Virtual Networks for Virtual Machine Grid Computing. USENIX VM Symposium, May 2004.
-
(2004)
USENIX VM Symposium
-
-
Sundararaj, A.1
Dinda, P.2
-
21
-
-
4644332598
-
Resource overbooking and application profiling in shared hosting platforms
-
Dec.
-
B. Urgaonkar, P. Shenoy, and T. Roscoe. Resource Overbooking and Application Profiling in Shared Hosting Platforms. USENIX OSDI 2002, Dec. 2002.
-
(2002)
USENIX OSDI 2002
-
-
Urgaonkar, B.1
Shenoy, P.2
Roscoe, T.3
|