-
1
-
-
78650607591
-
-
SAIL project website (2010). URL http://www.sail-project.eu/
-
(2010)
SAIL Project Website
-
-
-
2
-
-
78650593419
-
Cybercrime 2.0: When the cloud turns dark
-
Provos, N., Rajab, M.A., Mavrommatis, P.: Cybercrime 2.0: When the cloud turns dark. Queue 7(2), 46{47 (2009)
-
(2009)
Queue
, vol.7
, Issue.2
, pp. 46-47
-
-
Provos, N.1
Rajab, M.A.2
Mavrommatis, P.3
-
4
-
-
68249129760
-
Above the clouds: A berkeley view of cloud computing
-
EECS Department University of California, Berkeley
-
Armbrust, M., Fox, A., Grifith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berke- ley view of cloud computing. Tech. Rep. UCB/EECS-2009-28, EECS Department, University of California, Berkeley (2009)
-
(2009)
Tech. Rep. UCB/EECS-2009-28
-
-
Armbrust, M.1
Fox, A.2
Grifith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
5
-
-
21644433634
-
XEN and the art of virtualization
-
ACM, New York, NY, USA
-
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I.,Warfield, A.: XEN and the art of virtualization. In: SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, pp. 164{177. ACM, New York, NY, USA (2003)
-
(2003)
SOSP '03: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
6
-
-
78650599415
-
-
VMware
-
VMware (2010). URL http://www.vmware.com
-
(2010)
-
-
-
7
-
-
78650620243
-
Diverter: A new approach to networking within virtualized infrastructures
-
HP Laboratories
-
Edwards, A., Fischer, A., Lain, A.: Diverter: A new approach to networking within virtualized infrastructures. Tech. Rep. HPL-2009-231, HP Laboratories (2009)
-
(2009)
Tech. Rep. HPL-2009-231
-
-
Edwards, A.1
Fischer, A.2
Lain, A.3
-
8
-
-
78650622532
-
-
Amazon elastic block store
-
Amazon elastic block store (2010). URL http://aws.amazon.com/ebs/
-
(2010)
-
-
-
9
-
-
78650612154
-
-
Intel virtualization (2010). URL http://www.intel.com/technology/ virtualization/
-
(2010)
Intel Virtualization
-
-
-
10
-
-
78650615928
-
-
AMD Virtualization (AMD-V) Technology (2010). URL http://sites.amd.com/ us/business/it-solutions/virtualization/Pages/amd-v.aspx
-
(2010)
AMD Virtualization (AMD-V) Technology
-
-
-
12
-
-
24944574585
-
-
Directive 2002/58/EC of the European Parliament and of the Council of 12 july 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (directive on privacy and electronic communications
-
Directive 2002/58/EC of the European Parliament and of the Council of 12 july 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (directive on privacy and electronic communications). In: official Journal of the European Union, L201, pp. 0037{0047 (2002)
-
(2002)
Official Journal of the European Union
, vol.L201
, pp. 0037-0047
-
-
-
13
-
-
78650617177
-
-
Amazon virtual private cloud
-
Amazon virtual private cloud (2010). URL http://aws.amazon.com/vpc/
-
(2010)
-
-
-
14
-
-
33745196858
-
Insight and perspectives for content delivery networks
-
Pallis, G., Vakali, A.: Insight and perspectives for content delivery networks. Com- mun. ACM 49(1), 101{106 (2006)
-
(2006)
Commun. ACM
, vol.49
, Issue.1
, pp. 101-106
-
-
Pallis, G.1
Vakali, A.2
-
15
-
-
77249132188
-
A survey of network virtualization
-
Chowdhury, N.M.K., Boutaba, R.: A survey of network virtualization. Computer Networks 54(5), 862 { 876 (2010)
-
(2010)
Computer Networks
, vol.54
, Issue.5
, pp. 862-876
-
-
Chowdhury, N.M.K.1
Boutaba, R.2
-
16
-
-
33750303852
-
In VINI veritas: Realistic and controlled network experimentation
-
ACM, New York, NY, USA
-
Bavier, A., Feamster, N., Huang, M., Peterson, L., Rexford, J.: In VINI veritas: realistic and controlled network experimentation. In: SIGCOMM '06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 3{14. ACM, New York, NY, USA (2006)
-
(2006)
SIGCOMM '06: Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 3-14
-
-
Bavier, A.1
Feamster, N.2
Huang, M.3
Peterson, L.4
Rexford, J.5
-
17
-
-
84876357755
-
How to lease the internet in your spare time
-
Feamster, N., Gao, L., Rexford, J.: How to lease the internet in your spare time. SIGCOMM Comput. Commun. Rev. 37(1), 61{64 (2007)
-
(2007)
SIGCOMM Comput. Commun. Rev.
, vol.37
, Issue.1
, pp. 61-64
-
-
Feamster, N.1
Gao, L.2
Rexford, J.3
-
18
-
-
84977824459
-
Network virtualization architecture: Proposal and initial prototype
-
ACM, New York, NY, USA
-
Schaffrath, G., Werle, C., Papadimitriou, P., Feldmann, A., Bless, R., Greenhalgh, A., Wundsam, A., Kind, M., Maennel, O., Mathy, L.: Network virtualization ar- chitecture: proposal and initial prototype. In: VISA '09: Proceedings of the 1st ACM workshop on Virtualized infrastructure systems and architectures, pp. 63{ 72. ACM, New York, NY, USA (2009)
-
(2009)
VISA '09: Proceedings of the 1st ACM Workshop on Virtualized Infrastructure Systems and Architectures
, pp. 63-72
-
-
Schaffrath, G.1
Werle, C.2
Papadimitriou, P.3
Feldmann, A.4
Bless, R.5
Greenhalgh, A.6
Wundsam, A.7
Kind, M.8
Maennel, O.9
Mathy, L.10
-
20
-
-
65249152909
-
Virtual routers on the move: Live router migration as a network-management primitive
-
Wang, Y., Keller, E., Biskeborn, B., van der Merwe, J., Rexford, J.: Virtual routers on the move: live router migration as a network-management primitive. SIGCOMM Comput. Commun. Rev. 38(4), 231{242 (2008)
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.4
, pp. 231-242
-
-
Wang, Y.1
Keller, E.2
Biskeborn, B.3
Van Der Merwe, J.4
Rexford, J.5
-
21
-
-
78650609369
-
Security guidance for critical areas of focus in cloud computing v2.1
-
Brunette, G., Mogul, R.: Security guidance for critical areas of focus in cloud computing v2.1. Cloud Security Alliance (2009)
-
(2009)
Cloud Security Alliance
-
-
Brunette, G.1
Mogul, R.2
-
22
-
-
78650607340
-
Cloud computing security - Protection goals, taxonomy, market review
-
Institute for Secure Information Technology SIT
-
Streitberger W. Ruppel, A.: Cloud computing security - protection goals, taxon- omy, market review. Tech. rep., Institute for Secure Information Technology SIT (2010)
-
(2010)
Tech. Rep.
-
-
Streitberger, W.1
Ruppel, A.2
-
23
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM, New York, NY, USA
-
Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: CCS '09: Proceedings of the 16th ACM conference on Computer and communications security, pp. 199{212. ACM, New York, NY, USA (2009)
-
(2009)
CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
24
-
-
60849083522
-
XeNA: An access negotiation framework using XACML
-
Abi Haidar, D., Cuppens-Boulahia, N., Cuppens, F., Debar, H.: XeNA: an access negotiation framework using XACML. Annals of telecommunications 64(1), 155{ 169 (2009)
-
(2009)
Annals of Telecommunications
, vol.64
, Issue.1
, pp. 155-169
-
-
Abi Haidar, D.1
Cuppens-Boulahia, N.2
Cuppens, F.3
Debar, H.4
-
25
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
ACM, New York, NY, USA
-
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC '09: Proceedings of the 41st annual ACM symposium on Theory of computing, pp. 169{178. ACM, New York, NY, USA (2009)
-
(2009)
STOC '09: Proceedings of the 41st Annual ACM Symposium on Theory of Computing
, pp. 169-178
-
-
Gentry, C.1
-
27
-
-
77952407814
-
Organization based access control
-
Abou El Kalam, A., Baida, R.E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miège, A., Saurel, C., Trouessin, G.: Organization Based Access Control. In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (Policy'03) (2003)
-
(2003)
4th IEEE International Workshop on Policies for Distributed Systems and Networks (Policy'03)
-
-
Abou El Kalam, A.1
Baida, R.E.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Miège, A.7
Saurel, C.8
Trouessin, G.9
-
28
-
-
78650626004
-
-
XEN networking blog
-
XEN networking blog (2010). http://wiki.xensource.com/xenwiki/ XenNetworking
-
(2010)
-
-
-
31
-
-
20344391930
-
Intel virtualization technology
-
Uhlig, R., Neiger, G., Rodgers, D., Santoni, A., Martins, F., Anderson, A., Bennett, S., Kagi, A., Leung, F., Smith, L.: Intel virtualization technology. Computer 38(5), 48{56 (2005)
-
(2005)
Computer
, vol.38
, Issue.5
, pp. 48-56
-
-
Uhlig, R.1
Neiger, G.2
Rodgers, D.3
Santoni, A.4
Martins, F.5
Anderson, A.6
Bennett, S.7
Kagi, A.8
Leung, F.9
Smith, L.10
-
32
-
-
56649115709
-
The paradox of security in virtual environments
-
Price, M., Partners, A.: The Paradox of Security in Virtual Environments. Com- puter 41(11), 22{28 (2008)
-
(2008)
Computer
, vol.41
, Issue.11
, pp. 22-28
-
-
Price, M.1
Partners, A.2
-
33
-
-
33751032041
-
SubVirt: Implementing malware with virtual machines
-
King, S.T., Chen, P.M., Wang, Y.M., Verbowski, C., Wang, H.J., Lorch, J.R.: SubVirt: Implementing malware with virtual machines. Security and Privacy, IEEE Symposium on 0, 314{327 (2006)
-
(2006)
Security and Privacy, IEEE Symposium on
, vol.0
, pp. 314-327
-
-
King, S.T.1
Chen, P.M.2
Wang, Y.M.3
Verbowski, C.4
Wang, H.J.5
Lorch, J.R.6
-
34
-
-
78650590670
-
-
CA Community Blog: Zeus "in-the-cloud"
-
CA Community Blog: Zeus "in-the-cloud" (2009). http://community.ca.com/ blogs/securityadvisor/archive/2009/12/09/zeus-in-the- cloud.aspx
-
(2009)
-
-
|