-
1
-
-
77953221164
-
Securing elasticity in the cloud
-
Owens CD (2010) Securing elasticity in the cloud. Commun ACM 53(6):46-51. http://10.1145/1743546.1743565
-
(2010)
Commun ACM
, vol.53
, Issue.6
, pp. 46-51
-
-
Owens, C.D.1
-
3
-
-
79751511212
-
-
Tech. Rep. UCB/EECS-2010-5, EECS Department, University of California, Berkeley
-
Chen Y, Paxson V, Katz RH (2010) Whats new about cloud computing security. Tech. Rep. UCB/EECS-2010-5, EECS Department, University of California, Berkeley
-
(2010)
Whats New about Cloud Computing Security
-
-
Chen, Y.1
Paxson, V.2
Katz, R.H.3
-
4
-
-
69349098776
-
Cloud computing and the common man
-
10.1109/MC.2009.252
-
J Viega 2009 Cloud computing and the common man Computer 42 106 108 10.1109/MC.2009.252
-
(2009)
Computer
, vol.42
, pp. 106-108
-
-
Viega, J.1
-
6
-
-
79751490146
-
-
CSA: Cloud security guide cloud security alliance
-
CSA: Cloud security guide (2009) Tech. rep., cloud security alliance. http://www.cloudsecurityalliance.org/csaguide.pdf
-
(2009)
Tech. Rep.
-
-
-
8
-
-
79952065844
-
Top threats to cloud computing
-
Archer J, Boheme A, Cullinarie D, Puhlmann N, Kurtz P, Reavis J (2010) Top threats to cloud computing. Tech. rep., Cloud Security Alliance. http://www.cloudsecurityalliance.org/topthreats
-
(2010)
Tech. Rep., Cloud Security Alliance.
-
-
Archer, J.1
Boheme, A.2
Cullinarie, D.3
Puhlmann, N.4
Kurtz, P.5
Reavis, J.6
-
10
-
-
31844447686
-
The entropia virtual machine for desktop grids
-
DOI 10.1145/1064979.1065005, Proceedings of the First ACM/USENIX International Conference on Virual Execution Environments, VEE 05
-
Calder B, Chien AA, Wang J, Yang D (2005) The entropia virtual machine for desktop grids. In: VEE '05: Proceedings of the 1st ACM/USENIX international conference on virtual execution environments, pp 186-196. ACM, New York, NY, USA. http://doi.acm.org/10.1145/1064979.1065005 (Pubitemid 43195514)
-
(2005)
Proceedings of the First ACM/USENIX International Conference on Virual Execution Environments, VEE 05
, pp. 186-196
-
-
Calder, B.1
Chien, A.A.2
Wang, J.3
Yang, D.4
-
11
-
-
84880661546
-
Os circular: Internet client for reference
-
USENIX Association, Berkeley, CA, USA
-
Suzaki K, Yagi T, Iijima K, Quynh NA (2007) Os circular: internet client for reference. In: LISA'07: Proceedings of the 21st conference on large installation system administration conference, pp 1-12. USENIX Association, Berkeley, CA, USA
-
(2007)
LISA'07: Proceedings of the 21st Conference on Large Installation System Administration Conference
, pp. 1-12
-
-
Suzaki, K.1
Yagi, T.2
Iijima, K.3
Quynh, N.A.4
-
12
-
-
74049145625
-
Managing security of virtual machine images in a cloud environment
-
ACM, New York, NY, USA
-
Jinpeng W, Xiaolan Z, Glenn A, Vasanth B, Peng N (2009) Managing security of virtual machine images in a cloud environment. In: CCSW '09: Proceedings of the 2009 ACM workshop on Cloud computing security, pp 91-96. ACM, New York, NY, USA. http://doi.acm.org/10.1145/1655008.1655021
-
(2009)
CCSW '09: Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 91-96
-
-
Jinpeng, W.1
Xiaolan, Z.2
Glenn, A.3
Vasanth, B.4
Peng, N.5
-
13
-
-
70349262571
-
Secure control of portable images in a virtual computing utility
-
ACM, New York, NY, USA
-
Constandache I, Yumerefendi A, Chase J (2008) Secure control of portable images in a virtual computing utility. In: VMSec '08: Proceedings of the 1st ACM workshop on virtual machine security, pp 1-8. ACM, New York, NY, USA. http://doi.acm.org/10.1145/1456482.1456484
-
(2008)
VMSec '08: Proceedings of the 1st ACM Workshop on Virtual Machine Security
, pp. 1-8
-
-
Constandache, I.1
Yumerefendi, A.2
Chase, J.3
-
14
-
-
70349669587
-
Retaining data control to the client in infrastructure clouds
-
Descher M, Masser P, Feilhauer T, Tjoa AM, Huemer D (2009) Retaining data control to the client in infrastructure clouds. In: Availability, reliability and security, international conference on 0:9-16. http://doi. ieeecomputersociety.org/10.1109/ARES.2009.78
-
(2009)
Availability, Reliability and Security, International Conference on -rfvn1-temp 0
, pp. 9-16
-
-
Descher, M.1
Masser, P.2
Feilhauer, T.3
Tjoa, A.M.4
Huemer, D.5
-
15
-
-
77952281110
-
Providing secure services for a virtual infrastructure
-
Baldwin A, Dalton C, Shiu S, Kostienko K, Rajpoot Q (2009) Providing secure services for a virtual infrastructure. SIGOPS Oper Syst Rev 43(1):44-51. http://doi.acm.org/10.1145/1496909.1496919
-
(2009)
SIGOPS Oper Syst Rev
, vol.43
, Issue.1
, pp. 44-51
-
-
Baldwin, A.1
Dalton, C.2
Shiu, S.3
Kostienko, K.4
Rajpoot, Q.5
-
16
-
-
70349151793
-
Extending virtualization services with trust guarantees via behavioral monitoring
-
ACM, New York, NY, USA
-
Raj H, Schwan K (2009) Extending virtualization services with trust guarantees via behavioral monitoring. In: VDTS '09: Proceedings of the 1st EuroSys workshop on virtualization technology for dependable systems, pp 24-29. ACM, New York, NY, USA. http://doi.acm.org/10.1145/1518684.1518689
-
(2009)
VDTS '09: Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems
, pp. 24-29
-
-
Raj, H.1
Schwan, K.2
-
17
-
-
46749085115
-
Building trustworthy intrusion detection through vm introspection
-
IEEE Computer Society, Washington, DC, USA
-
Baiardi F, Sgandurra D (2007) Building trustworthy intrusion detection through vm introspection. In: IAS '07: Proceedings of the third international symposium on information assurance and security, pp 209-214. IEEE Computer Society, Washington, DC, USA. http://dx.doi.org/10.1109/IAS.2007.25
-
(2007)
IAS '07: Proceedings of the Third International Symposium on Information Assurance and Security
, pp. 209-214
-
-
Baiardi, F.1
Sgandurra, D.2
-
20
-
-
54049137283
-
Virtualization and hardware-based security
-
Perez R, van Doorn L, Sailer R (2008) Virtualization and hardware-based security. IEEE Secur Privacy 6(5):24-31. http://dx.doi.org/10.1109/MSP.2008.135
-
(2008)
IEEE Secur Privacy
, vol.6
, Issue.5
, pp. 24-31
-
-
Perez, R.1
Van Doorn, L.2
Sailer, R.3
-
21
-
-
52049083714
-
Ixiv vmm: A vmm on 2-level ring architecture. In: Computer and information technology
-
Aoyagi S, Oikawa S (2008) Ixiv vmm: a vmm on 2-level ring architecture. In: Computer and information technology, IEEE 8th international conference on 0:533-538. http://doi.ieeecomputersociety.org/10.1109/CIT.2008.Workshops.62
-
(2008)
IEEE 8th International Conference
, vol.0
, pp. 533-538
-
-
Aoyagi, S.1
Oikawa, S.2
-
22
-
-
33750248123
-
Building a MAC-based security architecture for the Xen open-source hypervisor
-
DOI 10.1109/CSAC.2005.13, 1565255, Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005
-
Sailer R, Jaeger T, Valdez E, Caceres R, Perez R, Berger S, Griffin JL, Doorn Lv (2005) Building a mac-based security architecture for the xen open-source hypervisor. In: ACSAC '05: Proceedings of the 21st annual computer security applications conference, pp 276-285. IEEE Computer Society, Washington, DC, USA. http://dx.doi.org/10.1109/CSAC.2005.13 (Pubitemid 46116484)
-
(2005)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, vol.2005
, pp. 276-285
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Caceres, R.4
Perez, R.5
Berger, S.6
Griffin, J.L.7
Van Doorn, L.8
-
23
-
-
55149108173
-
Flicker: An execution infrastructure for tcb minimization
-
ACM, New York, NY, USA
-
McCune JM, Parno BJ, Perrig A, Reiter MK, Isozaki H (2008) Flicker: an execution infrastructure for tcb minimization. In: Eurosys08: Proceedings of the 3rd ACM SIGOPS/EuroSys European conference on computer systems 2008, pp 315-328. ACM, New York, NY, USA
-
(2008)
Eurosys08: Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
24
-
-
34250017073
-
Hiding virtualization from attackers and malware
-
DOI 10.1109/MSP.2007.63
-
M Carpenter T Liston E Skoudis 2007 Hiding virtualization from attackers and malware IEEE Secur Privacy 5 62 65 10.1109/MSP.2007.63 (Pubitemid 46883436)
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.3
, pp. 62-65
-
-
Carpenter, M.1
Liston, T.2
Skoudis, E.3
-
25
-
-
77954737019
-
Load-based covert channels between xen virtual machines
-
ACM, New York, NY, USA
-
Okamura K, Oyama Y (2010) Load-based covert channels between xen virtual machines. In: SAC '10: Proceedings of the 2010 ACM symposium on applied computing, pp 173-180. ACM, New York, NY, USA. http://doi.acm.org/10.1145/ 1774088.1774125
-
(2010)
SAC '10: Proceedings of the 2010 ACM Symposium on Applied Computing
, pp. 173-180
-
-
Okamura, K.1
Oyama, Y.2
-
26
-
-
74349098073
-
Efficient cache attacks on aes, and countermeasures
-
10.1007/s00145-009-9049-y 2578662
-
E Tromer DA Osvik A Shamir 2009 Efficient cache attacks on aes, and countermeasures J Cryptol 23 1 37 71 10.1007/s00145-009-9049-y 2578662
-
(2009)
J Cryptol
, vol.23
, Issue.1
, pp. 37-71
-
-
Tromer, E.1
Osvik, D.A.2
Shamir, A.3
-
27
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
Advances in Cryptology - CRYPTO '96
-
Kocher PC (1996) Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In: CRYPTO '96: Proceedings of the 16th annual international cryptology conference on advances in cryptology, pp 104-113. Springer, London, UK (Pubitemid 126106234)
-
(1996)
Lecture Notes in Computer Science
, Issue.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
29
-
-
77952406152
-
Execution replay of multiprocessor virtual machines
-
ACM, New York, NY, USA
-
Dunlap GW, Lucchetti DG, Fetterman MA, Chen PM (2008) Execution replay of multiprocessor virtual machines. In: VEE '08: Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on virtual execution environments, pp 121-130. ACM, New York, NY, USA. http://doi.acm.org/10.1145/1346256.1346273
-
(2008)
VEE '08: Proceedings of the Fourth ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments
, pp. 121-130
-
-
Dunlap, G.W.1
Lucchetti, D.G.2
Fetterman, M.A.3
Chen, P.M.4
-
30
-
-
54049158161
-
I/o for virtual machine monitors: Security and performance issues
-
Karger PA, Safford DR (2008) I/o for virtual machine monitors: Security and performance issues. IEEE Secur Privacy 6(5):16-23. http://dx.doi.org/10. 1109/MSP.2008.119
-
(2008)
IEEE Secur Privacy
, vol.6
, Issue.5
, pp. 16-23
-
-
Karger, P.A.1
Safford, D.R.2
-
31
-
-
77955212682
-
Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
Wang Z, Jiang X (2010) Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In: 31st IEEE symposium on security and privacy
-
(2010)
31st IEEE Symposium on Security and Privacy
-
-
Wang, Z.1
Jiang, X.2
-
33
-
-
33846280529
-
Multi-level security requirements for hypervisors
-
DOI 10.1109/CSAC.2005.41, 1565254, Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005
-
Karger PA (2005) Multi-level security requirements for hypervisors. In: ACSAC '05: Proceedings of the 21st annual computer security applications conference, pp 267-275. IEEE Computer Society, Washington, DC, USA. http://dx.doi.org/10.1109/CSAC.2005.41 (Pubitemid 46116483)
-
(2005)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, vol.2005
, pp. 267-275
-
-
Karger, P.A.1
-
35
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
Garfinkel T, Pfaff B, Chow J, Rosenblum M, Boneh D (2003) Terra: a virtual machine-based platform for trusted computing. In: Proceedings of the nineteenth ACM symposium on operating systems principles, pp 193-206. ACM Press (Pubitemid 40929697)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
36
-
-
67049173187
-
Introducing role-based access control to a secure virtual machine monitor: Security policy enforcement mechanism for distributed computers
-
Hirano M, Shinagawa T, Eiraku H, Hasegawa S, Omote K, Tanimoto K, Horie T, Kato K, Okuda T, Kawai E, Yamaguchi S (2008) Introducing role-based access control to a secure virtual machine monitor: security policy enforcement mechanism for distributed computers. In: Asia-Pacific conference on services computing. 2006 IEEE 0:1225-1230. http://doi.ieeecomputersociety.org/10.1109/ APSCC.2008.14
-
(2008)
Asia-Pacific Conference on Services Computing. 2006 IEEE
, vol.0
, pp. 1225-1230
-
-
Hirano, M.1
Shinagawa, T.2
Eiraku, H.3
Hasegawa, S.4
Omote, K.5
Tanimoto, K.6
Horie, T.7
Kato, K.8
Okuda, T.9
Kawai, E.10
Yamaguchi, S.11
-
37
-
-
70450278760
-
Analysis of virtual machine system policies
-
ACM, New York, NY, USA
-
Rueda S, Vijayakumar H, Jaeger T (2009) Analysis of virtual machine system policies. In: SACMAT '09: Proceedings of the 14th ACM symposium on access control models and technologies, pp 227-236. ACM, New York, NY, USA. http://doi.acm.org/10.1145/1542207.1542243
-
(2009)
SACMAT '09: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies
, pp. 227-236
-
-
Rueda, S.1
Vijayakumar, H.2
Jaeger, T.3
-
38
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
Ristenpart T, Tromer E, Shacham H, Savage S (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: ACM conference on computer and communications security
-
(2009)
ACM Conference on Computer and Communications Security
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
41
-
-
84910156435
-
Vtpm: Virtualizing the trusted platform module
-
USENIX Association, Berkeley, CA, USA
-
Berger S, Cáceres R, Goldman KA, Perez R, Sailer R, van Doorn L (2006) vtpm: virtualizing the trusted platform module. In: USENIX-SS'06: Proceedings of the 15th conference on USENIX security symposium. USENIX Association, Berkeley, CA, USA
-
(2006)
USENIX-SS'06: Proceedings of the 15th Conference on USENIX Security Symposium
-
-
Berger S, C.1
-
42
-
-
58049146483
-
Secure virtual disk images for grid computing
-
IEEE Computer Society, Washington, DC, USA
-
Gebhardt C, Tomlinson A (2008) Secure virtual disk images for grid computing. In: APTC '08: Proceedings of the 2008 Third Asia-Pacific trusted infrastructure technologies conference, pp 19-29. IEEE Computer Society, Washington, DC, USA. http://dx.doi.org/10.1109/APTC.2008.17
-
(2008)
APTC '08: Proceedings of the 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference
, pp. 19-29
-
-
Gebhardt, C.1
Tomlinson, A.2
-
43
-
-
78650092266
-
Trusted-computing technologies for the protection of critical information systems
-
A Lioy G Ramunno D Vernizzi 2009 Trusted-computing technologies for the protection of critical information systems J Inform Assur Secur 4 449 457
-
(2009)
J Inform Assur Secur
, vol.4
, pp. 449-457
-
-
Lioy, A.1
Ramunno, G.2
Vernizzi, D.3
-
44
-
-
71749111778
-
Towards trusted cloud computing
-
Nuno Santos Krishna P, Gummadi RR (2009) Towards trusted cloud computing. In: Hot Cloud. http://www.usenix.org/event/hotcloud09/tech/full-papers/santos. pdf
-
(2009)
Hot Cloud
-
-
Nuno Santos Krishna, P.1
Gummadi, R.R.2
-
45
-
-
70350673437
-
Towards automated provisioning of secure virtualized networks
-
ACM, New York, NY, USA
-
Cabuk S, Dalton CI, Ramasamy H, Schunter M (2007) Towards automated provisioning of secure virtualized networks. In: CCS '07: Proceedings of the 14th ACM conference on computer and communications security, pp 235-245. ACM, New York, NY, USA. http://doi.acm.org/10.1145/1315245.1315275
-
(2007)
CCS '07: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 235-245
-
-
Cabuk, S.1
Dalton, C.I.2
Ramasamy, H.3
Schunter, M.4
-
46
-
-
84869381552
-
Deconstructing a secure processor
-
Tarnovsky C (2010) Deconstructing a secure processor. In: Black hat briefings federal. http://www.blackhat.com/presentations/bhdc10/Tarnovsky-Chris/ BlackHat%DC2010TarnovskyDASPslides.pdf
-
(2010)
Black Hat Briefings Federal
-
-
Tarnovsky, C.1
-
47
-
-
17444392883
-
Protecting client privacy with trusted computing at the server
-
DOI 10.1109/MSP.2005.49
-
Iliev A, Smith SW (2005) Protecting client privacy with trusted computing at the server. IEEE Secur Privacy 3(2):20-28. http://dx.doi.org/10.1109/MSP. 2005.49 (Pubitemid 40542058)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.2
, pp. 20-28
-
-
Iliev, A.1
Smith, S.W.2
-
48
-
-
0013417601
-
The packet vault: Secure storage of network data
-
USENIX Association, Berkeley, CA, USA
-
Antonelli CJ, Undy M, Honeyman P (1999) The packet vault: secure storage of network data. In: ID'99: Proceedings of the 1st conference on workshop on intrusion detection and network monitoring, pp 11-11. USENIX Association, Berkeley, CA, USA
-
(1999)
ID'99: Proceedings of the 1st Conference on Workshop on Intrusion Detection and Network Monitoring
, pp. 11-11
-
-
Antonelli, C.J.1
Undy, M.2
Honeyman, P.3
-
50
-
-
79751477919
-
-
The genesis kernel: a virtual network operating system for spawning network architectures (1999)
-
The genesis kernel: a virtual network operating system for spawning network architectures (1999)
-
-
-
-
51
-
-
21644433634
-
Xen and the art of virtualization
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
Barham P, Dragovic B, Fraser K, Hand S, Harris T, Ho A, Neugebauer R, Pratt I, Warfield A (2003) Xen and the art of virtualization. In: SOSP '03: Proceedings of the nineteenth ACM symposium on operating systems principles, pp 164-177. ACM, New York, NY, USA. http://doi.acm.org/10.1145/945445.945462 (Pubitemid 40929695)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
52
-
-
19944404595
-
Towards virtual networks for virtual machine grid computing
-
USENIX Association, Berkeley, CA, USA
-
Sundararaj AI, Dinda PA (2004) Towards virtual networks for virtual machine grid computing. In: VM'04: Proceedings of the 3rd conference on virtual machine research and technology symposium, pp 14-14. USENIX Association, Berkeley, CA, USA
-
(2004)
VM'04: Proceedings of the 3rd Conference on Virtual Machine Research and Technology Symposium
, pp. 14-14
-
-
Sundararaj, A.I.1
Dinda, P.A.2
-
53
-
-
0035400671
-
Dynamic Internet overlay deployment and management using the X-Bone
-
DOI 10.1016/S1389-1286(01)00172-4, PII S1389128601001724
-
Touch J (2001) Dynamic internet overlay deployment and management using the x-bone. Comput Netw 36(2-3):117-135. http://dx.doi.org/10.1016/S1389- 1286(01)00172-4 (Pubitemid 32420940)
-
(2001)
Computer Networks
, vol.36
, Issue.2-3
, pp. 117-135
-
-
Touch, J.1
-
54
-
-
0036036742
-
Resilient overlay networks
-
DOI 10.1145/502059.502048
-
Andersen D, Balakrishnan H, Kaashoek F, Morris R (2001) Resilient overlay networks. In: SOSP '01: Proceedings of the eighteenth ACM symposium on operating systems principles, pp 131-145. ACM, New York, NY, USA. http://doi.acm.org/10.1145/502034.502048 (Pubitemid 33612610)
-
(2001)
Operating Systems Review (ACM)
, vol.35
, Issue.5
, pp. 131-145
-
-
Andersen, D.1
Balakrishnan, H.2
Kaashoek, F.3
Morris, R.4
-
55
-
-
33750303852
-
In VINI veritas: Realistic and controlled network experimentation
-
DOI 10.1145/1151659.1159916
-
Bavier A, Feamster N, Huang M, Peterson L, Rexford J (2006) In vini veritas: realistic and controlled network experimentation. In: SIGCOMM '06: Proceedings of the 2006 conference on applications, technologies, architectures, and protocols for computer communications, pp 3-14. ACM, New York, NY, USA. http://doi.acm.org/10.1145/1159913.1159916 (Pubitemid 44623711)
-
(2006)
Computer Communication Review
, vol.36
, Issue.4
, pp. 3-14
-
-
Bavier, A.1
Feamster, N.2
Huang, M.3
Peterson, L.4
Rexford, J.5
-
56
-
-
33646538450
-
VDE: Virtual Distributed Ethernet
-
DOI 10.1109/TRIDNT.2005.38, 1386197, Proceddings - First International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, Tridentcom 2005
-
Davoli R (2005) Vde: Virtual distributed ethernet. In: TRIDENTCOM '05: Proceedings of the first international conference on testbeds and research infrastructures for the DEvelopment of NeTworks and COMmunities, pp 213-220. IEEE Computer Society, Washington, DC, USA. http://dx.doi.org/10.1109/TRIDNT. 2005.38 (Pubitemid 43727712)
-
(2005)
Proceddings - First International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, Tridentcom 2005
, vol.2005
, pp. 213-220
-
-
Davoli, R.1
-
59
-
-
77953957552
-
Dynamic topology adaptation of virtual networks of virtual machines
-
ACM, New York, NY, USA
-
Sundararaj AI, Gupta A, Dinda PA (2004) Dynamic topology adaptation of virtual networks of virtual machines. In: LCR '04: Proceedings of the 7th workshop on workshop on languages, compilers, and run-time support for scalable systems, pp 1-8. ACM, New York, NY, USA. http://doi.acm.org/10.1145/1066650. 1066665
-
(2004)
LCR '04: Proceedings of the 7th Workshop on Workshop on Languages, Compilers, and Run-time Support for Scalable Systems
, pp. 1-8
-
-
Sundararaj, A.I.1
Gupta, A.2
Dinda, P.A.3
-
61
-
-
70349754302
-
A scalable security model for enabling dynamic virtual private execution infrastructures on the internet
-
IEEE Computer Society, Washington, DC, USA
-
Primet PVB, Gelas JP, Mornard O, Koslovski G, Roca V, Giraud L, Montagnat J, Huu TT (2009) A scalable security model for enabling dynamic virtual private execution infrastructures on the internet. In: CCGRID '09: Proceedings of the 2009 9th IEEE/ACM international symposium on cluster computing and the grid, pp 348-355. IEEE Computer Society, Washington, DC, USA. http://dx.doi.org/10.1109/ CCGRID.2009.76
-
(2009)
CCGRID '09: Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid
, pp. 348-355
-
-
Pvb, P.1
Gelas, J.P.2
Mornard, O.3
Koslovski, G.4
Roca, V.5
Giraud, L.6
Montagnat, J.7
Huu, T.T.8
-
62
-
-
77954908948
-
Cloud security and privacy: An enterprise perspective on risks and compliance
-
Sebastopol, CA, USA
-
Mather T, Kumaraswamy S, Latif S (2009) Cloud security and privacy: an enterprise perspective on risks and compliance. O'Reailly Media, Sebastopol, CA, USA
-
(2009)
O'Reailly Media
-
-
Mather, T.1
Kumaraswamy, S.2
Latif, S.3
-
63
-
-
34548029519
-
Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors
-
DOI 10.1145/1272996.1273025, Operating Systems Review - Proceedings of the 2007 EuroSys Conference
-
Soltesz S, Potzl H, Pluczynski M, Bavier A, Peterson L (2007) Copntainer-based operating system virtualization: A scalablem hig-performance alternative to hypervisors. In: Eurosys, pp 275-287 (Pubitemid 47281589)
-
(2007)
Operating Systems Review (ACM)
, pp. 275-287
-
-
Soltesz, S.1
Potzl, H.2
Fiuczynski, M.E.3
Bavier, A.4
Peterson, L.5
-
65
-
-
36949033604
-
Ethane: Taking control of the enterprise
-
DOI 10.1145/1282380.1282382, ACM SIGCOMM 2007: Conference on Computer Communications
-
Casado M, Freedman MJ, Pettit J, Luo J, McKeown N, Shenker S (2007) Ethane: taking control of the enterprise. SIGCOMM Comput Commun Rev 37(4):1-12. http://doi.acm.org/10.1145/1282427.1282382 (Pubitemid 350239768)
-
(2007)
ACM SIGCOMM 2007: Conference on Computer Communications
, pp. 1-12
-
-
Casado, M.1
Freedman, M.J.2
Pettit, J.3
Luo, J.4
Mckeown, N.5
Shenker, S.6
-
66
-
-
69949091240
-
Networking challenges and resultant approaches for large scale cloud construction
-
Bernstein D, Ludvigson E (2009) Networking challenges and resultant approaches for large scale cloud construction.In: Grid and pervasive computing conference, workshops at the 0:136-142. http://doi.ieeecomputersociety.org/10. 1109/GPC.2009.10
-
(2009)
Grid and Pervasive Computing Conference, Workshops at the 0
, pp. 136-142
-
-
Bernstein, D.1
Ludvigson, E.2
-
67
-
-
79751492791
-
Extending networking into the virtualization layer
-
Pffaf B, Pettit J, Koponen T, Anidon K, Casado M, Shenker S (2009) Extending networking into the virtualization layer. In: ACM SIGCOMM's hot topics in networks (HotNets) workshops. http://conferences.sigcomm.org/hotnets/2009/ papers/hotnets2009-final143.pdf
-
(2009)
ACM SIGCOMM's Hot Topics in Networks (HotNets) Workshops
-
-
Pffaf, B.1
Pettit, J.2
Koponen, T.3
Anidon, K.4
Casado, M.5
Shenker, S.6
-
68
-
-
77955515611
-
From infrastructure delivery to service management in clouds
-
10.1016/j.future.2010.02.013
-
L Rodero-Merino LM Vaquero V Gil F Galán J Fontán RS Montero IM Llorente 2010 From infrastructure delivery to service management in clouds Future Gen Comput Syst 26 8 1226 1240 10.1016/j.future.2010.02.013
-
(2010)
Future Gen Comput Syst
, vol.26
, Issue.8
, pp. 1226-1240
-
-
Rodero-Merino, L.1
Vaquero, L.M.2
Gil, V.3
Galán, F.4
Fontán, J.5
Montero, R.S.6
Llorente, I.M.7
-
70
-
-
77950875313
-
Quantified security is a weak hypothesis: A critical survey of results and assumptions
-
ACM, New York, NY, USA
-
Verendel V (2009) Quantified security is a weak hypothesis: a critical survey of results and assumptions. In: NSPW '09: Proceedings of the 2009 workshop on new security paradigms workshop, pp 37-50. ACM, New York, NY, USA. http://doi.acm.org/10.1145/1719030.1719036
-
(2009)
NSPW '09: Proceedings of the 2009 Workshop on New Security Paradigms Workshop
, pp. 37-50
-
-
Verendel, V.1
-
71
-
-
78149373146
-
Formal approach to security metrics.: What does "more secure" mean for you?
-
ACM, New York, NY, USA
-
Krautsevich L, Martinelli F, Yautsiukhin A (2010) Formal approach to security metrics.: what does "more secure" mean for you? In: ECSA '10: Proceedings of the fourth European conference on software architecture, pp 162-169. ACM, New York, NY, USA. http://doi.acm.org/10.1145/1842752.1842787
-
(2010)
ECSA '10: Proceedings of the Fourth European Conference on Software Architecture
, pp. 162-169
-
-
Krautsevich, L.1
Martinelli, F.2
Yautsiukhin, A.3
|