-
2
-
-
79952018681
-
-
Feb. [Online]. Available
-
(2010, Feb.) Billing and budgeting resources. [Online]. Available: http://code.google.com/intl/en/appengine/docs/billing.html
-
(2010)
Billing and Budgeting Resources
-
-
-
3
-
-
79960771868
-
-
Feb. [Online]. Available
-
(2010, Feb.) What is Google App Engine? [Online]. Available: http://code.google.com/intl/en/appengine/docs/whatisgoogleappengine.html
-
(2010)
What Is Google App Engine?
-
-
-
4
-
-
79952014072
-
-
Feb. [Online]. Available
-
(2010, Feb.) Windows Azure platform pricing. [Online]. Available: http://www.microsoft.com/windowsazure/pricing/
-
(2010)
Windows Azure Platform Pricing
-
-
-
6
-
-
79952021571
-
-
Feb. [Online]. Available
-
T. Hoffman. (2010, Feb.) HP takes new pricing path for utility-based computing. [Online]. Available: http://www.computerworld.com/s/article/81522/HP- takes-new-pricing-path-for-utility-based-computing?taxonomyId=074
-
(2010)
HP Takes New Pricing Path for Utility-based Computing
-
-
Hoffman, T.1
-
7
-
-
79952036129
-
-
Feb. [Online]. Available
-
(2010, Feb.) Quotas. [Online]. Available: http://code.google.com/intl/en/ appengine/docs/quotas.html
-
(2010)
Quotas
-
-
-
9
-
-
84947264061
-
Gridbank: A grid accounting services architecture (GASA) for distributed systems sharing and integration
-
A. Barmouta and R. Buyya, "Gridbank: A grid accounting services architecture (GASA) for distributed systems sharing and integration," in Proceedings of IPDPS, 2003.
-
Proceedings of IPDPS, 2003
-
-
Barmouta, A.1
Buyya, R.2
-
10
-
-
35048857465
-
Reliable accounting in grid economic transactions
-
L. Catuogno, P. Faruolo, U. F. Petrillo, and I. Visconti, "Reliable accounting in grid economic transactions," in Proceedings of GCC Workshops, 2004, pp. 514-521.
-
Proceedings of GCC Workshops, 2004
, pp. 514-521
-
-
Catuogno, L.1
Faruolo, P.2
Petrillo, U.F.3
Visconti, I.4
-
11
-
-
0027204514
-
Towards uncheatable benchmarks
-
J. Cai, R. Lipton, R. Sedgewick, and A. Yao, "Towards uncheatable benchmarks," in Proceedings of IEEE Structure in Complexity Theory Conference, 1993, pp. 2-11.
-
Proceedings of IEEE Structure in Complexity Theory Conference, 1993
, pp. 2-11
-
-
Cai, J.1
Lipton, R.2
Sedgewick, R.3
Yao, A.4
-
12
-
-
84937555419
-
Uncheatable distributed computations
-
P. Golle and I. Mironov, "Uncheatable distributed computations," in Proceedings of RSA Conference, Cryptographer's Track, 2001, pp. 425-440.
-
Proceedings of RSA Conference, Cryptographer's Track, 2001
, pp. 425-440
-
-
Golle, P.1
Mironov, I.2
-
15
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn, "Design and implementation of a TCG-based integrity measurement architecture," in Proceedings of USENIX Security Symposium, 2004, pp. 223-238.
-
Proceedings of USENIX Security Symposium, 2004
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
16
-
-
77952371831
-
-
Trusted Computing Group, Main Specification Version 1.2 rev. 103, [Online]. Available
-
Trusted Computing Group, "TPM main specification," Trusted Computing Group, Main Specification Version 1.2 rev. 103, 2007. [Online]. Available: http://www.trustedcomputinggroup.org/resources/tpm-main-specification
-
(2007)
TPM Main Specification
-
-
-
17
-
-
0036704573
-
Watermarking, tamper-proofing, and obfuscation - Tools for software protection
-
C. S. Collberg and C. Thomborson, "Watermarking, tamper-proofing, and obfuscation - tools for software protection," IEEE Trans. Softw. Eng., vol. 28, no. 8, pp. 735-746, 2002.
-
(2002)
IEEE Trans. Softw. Eng.
, vol.28
, Issue.8
, pp. 735-746
-
-
Collberg, C.S.1
Thomborson, C.2
-
18
-
-
79952031167
-
-
Feb. [Online]. Available
-
(2010, Feb.) Pi. [Online]. Available: http://sourceforge.net/projects/ projectpi/
-
(2010)
Pi
-
-
-
19
-
-
79952026189
-
-
Feb. [Online]. Available
-
(2010, Feb.) Whetstone. [Online]. Available: http://www.netlib.org/ benchmark/whetstonec
-
(2010)
Whetstone
-
-
-
20
-
-
79952025909
-
-
Feb. [Online]. Available
-
(2010, Feb.) Brute. [Online]. Available: http://sourceforge.net/projects/ brute2/
-
(2010)
Brute
-
-
-
21
-
-
84978897353
-
Ptrace, utrace, uprobes: Lightweight, dynamic tracing of user apps
-
J. Keniston, A. Mavinakayanahalli, P. Panchamukhi, and V. Prasad, "Ptrace, utrace, uprobes: Lightweight, dynamic tracing of user apps," in Proceedings of the Linux Symposium, 2007, pp. 215-224.
-
Proceedings of the Linux Symposium, 2007
, pp. 215-224
-
-
Keniston, J.1
Mavinakayanahalli, A.2
Panchamukhi, P.3
Prasad, V.4
-
22
-
-
85084164351
-
Linux security modules: General security support for the Linux kernel
-
C. Wright, C. Cowan, S. Smalley, J. Morris, and G. Kroah-Hartman, "Linux security modules: General security support for the Linux kernel," in Proceedings of USENIX Security Symposium, 2002, pp. 17-31.
-
Proceedings of USENIX Security Symposium, 2002
, pp. 17-31
-
-
Wright, C.1
Cowan, C.2
Smalley, S.3
Morris, J.4
Kroah-Hartman, G.5
-
23
-
-
2442425355
-
Integrating flexible support for security policies into the Linux operating system
-
P. Loscocco and S. Smalley, "Integrating flexible support for security policies into the Linux operating system," in Proceedings of USENIX Annual Technical Conference, FREENIX Track, 2001, pp. 29-42.
-
Proceedings of USENIX Annual Technical Conference, FREENIX Track, 2001
, pp. 29-42
-
-
Loscocco, P.1
Smalley, S.2
-
24
-
-
70349234685
-
Remote attestation on program execution
-
L. Gu, X. Ding, R. H. Deng, B. Xie, and H. Mei, "Remote attestation on program execution," in Proceedings of the Workshop on Scalable Trusted Computing, STC, 2008, pp. 11-20.
-
Proceedings of the Workshop on Scalable Trusted Computing, STC, 2008
, pp. 11-20
-
-
Gu, L.1
Ding, X.2
Deng, R.H.3
Xie, B.4
Mei, H.5
-
25
-
-
85062418620
-
Noncontrol-data attacks are realistic threats
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer, "Noncontrol-data attacks are realistic threats," in Proceedings of USENIX Security Symposium, 2005, pp. 177-192.
-
Proceedings of USENIX Security Symposium, 2005
, pp. 177-192
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
26
-
-
85174664325
-
Distributed execution with remote audit
-
F. Monrose, P. Wyckoff, and A. Rubin, "Distributed execution with remote audit," in Proceedings of Network ad Distributed System Security Symposium (NDSS), 1999, pp. 103-113.
-
Proceedings of Network Ad Distributed System Security Symposium (NDSS), 1999
, pp. 103-113
-
-
Monrose, F.1
Wyckoff, P.2
Rubin, A.3
|