-
1
-
-
56349150824
-
Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities
-
August [Online]. Available
-
R. Buyya, C. S. Yeo, and S. Venugopal, "Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities," Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, p. 9, August 2008. [Online]. Available: http://arxiv.org/abs/0808.3558
-
(2008)
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications
, pp. 9
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
-
2
-
-
17144406525
-
-
SLA Management Team, 4th ed. Enterprise Perspective
-
SLA Management Team, SLA Management Handbook, 4th ed. Enterprise Perspective, 2004.
-
(2004)
SLA Management Handbook
-
-
-
3
-
-
38149017227
-
Service Level Agreements: Web Services and Security
-
ser. Berlin, Heidelberg: Springer Berlin Heidelberg
-
G. Frankova, Service Level Agreements: Web Services and Security, ser. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, vol. 4607.
-
(2007)
Lecture Notes in Computer Science
, vol.4607
-
-
Frankova, G.1
-
4
-
-
80054796219
-
Service Level Agreement in Cloud Computing
-
[Online]. Available
-
P. Patel, A. Ranabahu, and A. Sheth, "Service Level Agreement in Cloud Computing," Cloud Workshops at OOPSLA09, 2009. [Online]. Available: http://knoesis.wright.edu/aboutus/visitors/summer2009/PatelReport.pdf
-
Cloud Workshops at OOPSLA09, 2009
-
-
Patel, P.1
Ranabahu, A.2
Sheth, A.3
-
5
-
-
70349750047
-
The Eucalyptus Open-Source Cloud-Computing System
-
vol. 0
-
D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov, "The Eucalyptus Open-Source Cloud-Computing System," Cluster Computing and the Grid, IEEE International Symposium on, vol. 0, pp. 124-131, 2009.
-
(2009)
Cluster Computing and the Grid, IEEE International Symposium on
, pp. 124-131
-
-
Nurmi, D.1
Wolski, R.2
Grzegorczyk, C.3
Obertelli, G.4
Soman, S.5
Youseff, L.6
Zagorodnov, D.7
-
7
-
-
67651053378
-
-
Manning Publications, [Online]. Available
-
R. Kanneganti and P. Chodavarapu, SOA Security. Manning Publications, 2008. [Online]. Available: http://www.amazon.com/SOASecurity-Ramarao-Kanneganti/ dp/1932394680
-
(2008)
SOA Security
-
-
Kanneganti, R.1
Chodavarapu, P.2
-
10
-
-
77953173466
-
-
[Online]. Available
-
B. D. Payne, "Xenaccess." [Online]. Available: http://doc.xenaccess.org/
-
Xenaccess
-
-
Payne, B.D.1
-
11
-
-
77953163208
-
-
[Online]. Available
-
J. Kirch, "Virtual machine security guidelines," 2007. [Online]. Available: http://www.cisecurity.org/tools2/vm/CIS\ VM\ Benchmark\ v1.0.pdf
-
(2007)
Virtual Machine Security Guidelines
-
-
Kirch, J.1
-
12
-
-
21644455412
-
-
ACM Press
-
T. G. Ben, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, "Terra: A Virtual Machine-Based Platform for Trusted Computing." ACM Press, 2003, pp. 193-206.
-
(2003)
Terra: A Virtual Machine-Based Platform for Trusted Computing
, pp. 193-206
-
-
Ben, T.G.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
13
-
-
77953168506
-
TVDc: Managing security in the trusted virtual datacenter
-
S. Berger, R. Cáceres, D. Pendarakis, R. Sailer, E. Valdez, R. Perez, W. Schildhauer, and D. Srinivasan, "TVDc: Managing security in the trusted virtual datacenter," ACM SIGOPS Operating Systems Review, vol. 42, no. 1, p. 7, 2008.
-
(2008)
ACM SIGOPS Operating Systems Review
, vol.42
, Issue.1
, pp. 7
-
-
Berger, S.1
Cáceres, R.2
Pendarakis, D.3
Sailer, R.4
Valdez, E.5
Perez, R.6
Schildhauer, W.7
Srinivasan, D.8
-
14
-
-
77953149929
-
-
[Online]. Available
-
S. Berger, R. Caceres, D. Pendarakis, R. Sailer, E. Valdez, R. Perez, W. Schildhauer, and D. Srinivasan, "Security for the cloud infrastrcture: trusted virtual data center (TVDc)." [Online]. Available: www.kiskeya.net/ramon/work/pubs/ibmjrd09.pdf
-
Security for the Cloud Infrastrcture: Trusted Virtual Data Center (TVDc)
-
-
Berger, S.1
Caceres, R.2
Pendarakis, D.3
Sailer, R.4
Valdez, E.5
Perez, R.6
Schildhauer, W.7
Srinivasan, D.8
-
15
-
-
79951816145
-
Towards Trusted Cloud Computing
-
[Online]. Available
-
N. Santos, G. P. Krishna, and R. Rodrigues, "Towards Trusted Cloud Computing," HotCloud'09, 2009. [Online]. Available: http://www.usenix.org/ event/hotcloud09/tech/full papers/santos.pdf
-
(2009)
HotCloud'09
-
-
Santos, N.1
Krishna, G.P.2
Rodrigues, R.3
-
17
-
-
71549130410
-
Security Protocols
-
ser. Berlin, Heidelberg: Springer Berlin Heidelberg
-
W. Mao, A. Martin, H. Jin, and H. Zhang, Security Protocols, ser. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009, vol. 5087.
-
(2009)
Lecture Notes in Computer Science
, vol.5087
-
-
Mao, W.1
Martin, A.2
Jin, H.3
Zhang, H.4
-
18
-
-
56649102115
-
Property-Based TPM Virtualization
-
"Property-Based TPM Virtualization," Lecture Notes In Computer Science; Vol. 5222, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5222
-
-
-
19
-
-
51849091963
-
-
V. Scarlata, C. Rozas, M. Wiseman, D. Grawrock, and C. Vishik, "TPM Virtualization: Building a General Framework," pp. 43 - 56, 2007.
-
(2007)
TPM Virtualization: Building a General Framework
, pp. 43-56
-
-
Scarlata, V.1
Rozas, C.2
Wiseman, M.3
Grawrock, D.4
Vishik, C.5
-
20
-
-
84910156435
-
vTPM:virtualizing the trusted platform module
-
S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn, "vTPM:virtualizing the trusted platform module," USENIX Security Symposium, 2006.
-
USENIX Security Symposium, 2006
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
21
-
-
77952329878
-
Improving Xen security through disaggregation
-
D. G. Murray, G. Milos, and S. Hand, "Improving Xen security through disaggregation," ACM/Usenix International Conference On Virtual Execution Environments, p. 9, 2008.
-
(2008)
ACM/Usenix International Conference on Virtual Execution Environments
, pp. 9
-
-
Murray, D.G.1
Milos, G.2
Hand, S.3
-
22
-
-
77950793589
-
Justifying Integrity Using a Virtual Machine
-
[Online]. Available
-
J. Schiffman, T. Moyer, C. Shal, J. Trent, and P. McDaniel, "Justifying Integrity Using a Virtual Machine," 25th Annual Computer Security Applications Conference (ACSAC), 2009. [Online]. Available: http://www.patrickmcdaniel.org/pubs/acsac09c.pdf
-
25th Annual Computer Security Applications Conference (ACSAC), 2009
-
-
Schiffman, J.1
Moyer, T.2
Shal, C.3
Trent, J.4
McDaniel, P.5
-
23
-
-
51949119355
-
-
NewYork
-
R. Sailer, E. Valdez, T. Jaeger, R. Perez, L. van Doorn, J. L. Griffin, and S. Berger, "sHype: Secure hypervisor approach to trusted virtualized systems," NewYork, p. 12, 2005.
-
(2005)
sHype: Secure Hypervisor Approach to Trusted Virtualized Systems
, pp. 12
-
-
Sailer, R.1
Valdez, E.2
Jaeger, T.3
Perez, R.4
Van Doorn, L.5
Griffin, J.L.6
Berger, S.7
-
25
-
-
67649871826
-
-
[Online]. Available
-
J. Matthews, E. M. Dow, T. Deshane, W. Hu, J. Bongio, P. F. Wilbur, and B. Johnson, Running Xen: A Hands-on Guide to the Art of Virtualization, 2008. [Online]. Available: http://books.google.com/books?id=XS-Jj7s2nhYC&pgis=1
-
(2008)
Running Xen: A Hands-on Guide to the Art of Virtualization
-
-
Matthews, J.1
Dow, E.M.2
Deshane, T.3
Hu, W.4
Bongio, J.5
Wilbur, P.F.6
Johnson, B.7
-
31
-
-
84870692036
-
Intrusion Detection Techniques in Grid and Cloud Computing Environment
-
no. PrePrints
-
K. Vieira, A. Schulter, C. Westphall, and C. Westphall, "Intrusion Detection Techniques in Grid and Cloud Computing Environment," IT Professional, vol. 99, no. PrePrints, 2009.
-
(2009)
IT Professional
, vol.99
-
-
Vieira, K.1
Schulter, A.2
Westphall, C.3
Westphall, C.4
-
32
-
-
9744239645
-
Intrusion Prevention System Design
-
X. Zhang, C. Li, and W. Zheng, "Intrusion Prevention System Design," CIT, 2004.
-
(2004)
CIT
-
-
Zhang, X.1
Li, C.2
Zheng, W.3
-
34
-
-
55649089217
-
Automated containment of rootkits attacks
-
[Online]. Available
-
A. Baliga, L. Iftode, and X. Chen, "Automated containment of rootkits attacks," Computers & Security, vol. 27, no. 7-8, pp. 323-334, 2008. [Online]. Available: http://linkinghub.elsevier.com/retrieve/pii/ S0167404808000382
-
(2008)
Computers & Security
, vol.27
, Issue.7-8
, pp. 323-334
-
-
Baliga, A.1
Iftode, L.2
Chen, X.3
-
35
-
-
49049106371
-
Anti-DDoS Virtualized Operating System
-
S. Garg and H. Saran, "Anti-DDoS Virtualized Operating System," ARES, p. 7, 2008.
-
(2008)
ARES
, pp. 7
-
-
Garg, S.1
Saran, H.2
-
37
-
-
85059766484
-
Live migration of virtual machines
-
C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A. Warfield, "Live migration of virtual machines," Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2, 2005.
-
Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation - Volume 2, 2005
-
-
Clark, C.1
Fraser, K.2
Hand, S.3
Hansen, J.G.4
Jul, E.5
Limpach, C.6
Pratt, I.7
Warfield, A.8
-
42
-
-
10444234214
-
MapCenter: An Open Grid Status Visualization Tool
-
[Online]. Available
-
F. Bonnassieux, R. Harakaly, and P. Primet, "MapCenter: An Open Grid Status Visualization Tool," in proceedings of ISCA 15th International Conference on parallel and distributed computing systems, 2002, pp. 2-3. [Online]. Available: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11. 7294
-
Proceedings of ISCA 15th International Conference on Parallel and Distributed Computing Systems, 2002
, pp. 2-3
-
-
Bonnassieux, F.1
Harakaly, R.2
Primet, P.3
-
43
-
-
77953150476
-
Grid monitoring with NetSaint
-
[Online]. Available
-
R. Barbera, P. L. Re, G. Sava, and G. Tortone, "Grid monitoring with NetSaint," Bologna-Datagrid WP7 meeting, 2002. [Online]. Available: http://www.cnaf.infn.it/~ferrari/infn-grid-wp5/taskdg/task3/datagridwp7- netsaint.pdf
-
Bologna-Datagrid WP7 Meeting, 2002
-
-
Barbera, R.1
Re, P.L.2
Sava, G.3
Tortone, G.4
-
45
-
-
84948153094
-
Key Management for Encrypted Data Storage in Distributed Systems
-
L. Seitz, J.-M. Pierson, and L. Brunie, "Key Management for Encrypted Data Storage in Distributed Systems," SISW, 2003.
-
(2003)
SISW
-
-
Seitz, L.1
Pierson, J.-M.2
Brunie, L.3
-
46
-
-
77953161241
-
Research and Implement of an Encrypted File System Used to NAS
-
H. Jianzhong, X. Changsheng, and C. Bin, "Research and Implement of an Encrypted File System Used to NAS," SISW, 2003.
-
(2003)
SISW
-
-
Jianzhong, H.1
Changsheng, X.2
Bin, C.3
|