메뉴 건너뛰기




Volumn , Issue , 2010, Pages 651-658

Modeling the runtime integrity of cloud servers: A scoped invariant perspective

Author keywords

Integrity modeling; Invariants detection; Tools; Xen

Indexed keywords

BUFFER OVERFLOWS; COMPUTING SECURITY; DESCRIPTORS; INTEGRITY MODELING; INVARIANTS DETECTION; RUN-TIME SOFTWARE; RUNTIMES; SOFTWARE SYSTEMS; VIRTUAL-MACHINE MANAGERS; XEN;

EID: 79952380988     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CloudCom.2010.29     Document Type: Conference Paper
Times cited : (8)

References (28)
  • 6
    • 79952394985 scopus 로고    scopus 로고
    • accessed August 16, 2010
    • chkrootkit. http://www.chkrootkit.org/, accessed August 16, 2010.
  • 21
    • 84991799247 scopus 로고    scopus 로고
    • An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
    • N. Petroni, T. Fraser, A. Walters, and W. Arbaugh, "An architecture for specification-based detection of semantic integrity violations in kernel dynamic data", 15th USENIX Security Symposium, 2006.
    • 15th USENIX Security Symposium, 2006
    • Petroni, N.1    Fraser, T.2    Walters, A.3    Arbaugh, W.4
  • 26
    • 79952371050 scopus 로고    scopus 로고
    • accessed August 16, 2010
    • Trusted Computing Group. http://www.trustedcomputinggroup.org, accessed August 16, 2010.
  • 27
    • 84870630391 scopus 로고    scopus 로고
    • accessed August 16, 2010
    • Trusted Platform Modules. http://www.trustedcomputinggroup.org/ developers/trusted-platform-module/specifications, accessed August 16, 2010.
    • Trusted Platform Modules


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.