-
1
-
-
68249129760
-
Above the clouds: A berkeley view of cloud computing
-
UCB/EECS-2009-28. Berkeley: University of California, EECS Department
-
Armbrust M, Fox A, Griffith R, et al. Above the clouds: A berkeley view of cloud computing, UCB/EECS-2009-28[R]. Berkeley: University of California, EECS Department, 2009
-
(2009)
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
-
3
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
New York: ACM
-
Ristenpart T, Tromer E, Shacham H, et al. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds[C]//Proc of the 16th ACM Conf on Computer and Communications Security. New York: ACM, 2009: 199-212
-
(2009)
Proc of the 16th ACM Conf on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
-
4
-
-
80051576193
-
Amazon Web services customer agreement
-
2009-10-01
-
Amazon Inc. Amazon Web services customer agreement[EB/OL]. [2009-10-01]. http://aws.amazon.com/agreement/#7
-
-
-
-
5
-
-
35348963573
-
Daonity-grid security from two levels of virtualization
-
Chen Haibo, Chen Jieyun, Mao Wenbo, et al. Daonity-grid security from two levels of virtualization[J]. Information Security Technical Report, 2007, 12(3): 123-138
-
(2007)
Information Security Technical Report
, vol.12
, Issue.3
, pp. 123-138
-
-
Chen, H.1
Chen, J.2
Mao, W.3
-
8
-
-
58049139900
-
Tamper-resistant execution in an untrusted operating system using a virtual machine monitor, 2007-08001
-
Shanghai: Fudan University, Parallel Processing Institute
-
Chen Haibo, Zhang Fengzhe, Chen Cheng, et al. Tamper-resistant execution in an untrusted operating system using a virtual machine monitor, 2007-08001[R]. Shanghai: Fudan University, Parallel Processing Institute, 2007
-
(2007)
-
-
Chen, H.1
Zhang, F.2
Chen, C.3
-
9
-
-
70249085218
-
A hypervisor based system for protecting software runtime memory and persistent storage
-
New York: ACM
-
Dewan P, Durham D, Khosravi H, et al. A hypervisor based system for protecting software runtime memory and persistent storage[C]//Proc of the 2008 Spring Simulation Multiconference. New York: ACM, 2008: 828-835
-
(2008)
Proc of the 2008 Spring Simulation Multiconference
, pp. 828-835
-
-
Dewan, P.1
Durham, D.2
Khosravi, H.3
-
10
-
-
77955817084
-
Improving the dependability of cloud computing systems
-
Chinese source. Shanghai: Parallel Processing Institute, Fudan University
-
Chen Haibo. Improving the Dependability of Cloud Computing Systems[D]. Shanghai: Parallel Processing Institute, Fudan University, 2008 (in Chinese)
-
(2008)
-
-
Chen, H.1
-
11
-
-
85018107502
-
Vanish: Increasing data privacy with self-destructing data
-
Berkeley, CA: USENIX
-
Geambasu R, Kohno T, Levy A, et al. Vanish: Increasing data privacy with self-destructing data[C]//Proc of the 18th USENIX Security Symp. Berkeley, CA: USENIX, 2009: 299-316
-
(2009)
Proc of the 18th USENIX Security Symp
, pp. 299-316
-
-
Geambasu, R.1
Kohno, T.2
Levy, A.3
-
13
-
-
78149314301
-
Tpm specification version 1.2, revision 103
-
2007-07-09
-
Trusted Computing Group. Tpm specification version 1.2, revision 103[EB/OL]. [2007-07-09]. http://www.trustedcomputinggroup.org
-
-
-
-
14
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
Berkeley, CA: USENIX
-
Sailer R, Zhang X, Jaeger T, et al. Design and implementation of a TCG-based integrity measurement architecture[C]//Proc of the 13th USENIX Security Symp. Berkeley, CA: USENIX, 2004: 223-238
-
(2004)
Proc of the 13th USENIX Security Symp
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
-
15
-
-
34047117968
-
Cache missing for fun and profit
-
2005-05-13
-
Percival C. Cache missing for fun and profit[EB/OL]. [2005-05-13]. http://www.daemonology.net/hyperthreading-considered-harmful
-
-
-
Percival, C.1
-
19
-
-
33744529805
-
Cache-timing attacks on AES
-
2004-11-11
-
Bernstein D. Cache-timing attacks on AES[EB/OL]. [2004-11-11]. http://cr.yp.to/papers.html#cachetiming
-
-
-
Bernstein, D.1
-
25
-
-
35348816106
-
New cache designs for thwarting software cache-based side channel attacks
-
New York: ACM
-
Wang Z, Lee R. New cache designs for thwarting software cache-based side channel attacks[C]//Proc of the 34th Annual Int Symp on Computer Architecture. New York: ACM, 2007: 494-505
-
(2007)
Proc of the 34th Annual Int Symp on Computer Architecture
, pp. 494-505
-
-
Wang, Z.1
Lee, R.2
|