-
1
-
-
80052175376
-
-
Open Stack. http://www.openstack.org.
-
-
-
-
2
-
-
80052173082
-
-
PrivacyCA. http://www.privacyca.com.
-
-
-
-
3
-
-
77950347409
-
A view of cloud computing
-
April
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. A view of cloud computing. Communications of the ACM, 53(4):50-58, April 2010.
-
(2010)
Communications of the ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
4
-
-
21644433634
-
Xen and the art of virtualization
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
P. Barham, B. Dragovic, K. Fraiser, S. Hand, T. Harris, A. Ho, R. Neugebaurer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, pages 164-177, October 2003. (Pubitemid 40929695)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
5
-
-
84910156435
-
VTPM: Virtualizing the trusted platform module
-
August
-
S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn. vTPM: Virtualizing the trusted platform module. In Proceedings of the 15th USENIX Security Symposium, pages 305-320, August 2006.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
, pp. 305-320
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
6
-
-
79955971286
-
DepSky: Dependable and secure storage in a cloud-of-clouds
-
April
-
A. Bessani, M. Correia, B. Quaresma, F. André, and P. Sousa. DepSky: Dependable and secure storage in a cloud-of-clouds. In Proceedings of the European Conference on Computer Systems (EuroSys), pages 31-46, April 2011.
-
(2011)
Proceedings of the European Conference on Computer Systems (EuroSys)
, pp. 31-46
-
-
Bessani, A.1
Correia, M.2
Quaresma, B.3
André, F.4
Sousa, P.5
-
10
-
-
78650039008
-
Cloud computing roundtable
-
E. Grosse, J. Howie, J. Ransome, J. Reavis, and S. Schmidt. Cloud computing roundtable. IEEE Security Privacy, 8(6):17-23, 2010.
-
(2010)
IEEE Security Privacy
, vol.8
, Issue.6
, pp. 17-23
-
-
Grosse, E.1
Howie, J.2
Ransome, J.3
Reavis, J.4
Schmidt, S.5
-
11
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
August
-
J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten. Lest we remember: Cold boot attacks on encryption keys. In Proceedings of the 17th USENIX Security Symposium, pages 45-60, August 2008.
-
(2008)
Proceedings of the 17th USENIX Security Symposium
, pp. 45-60
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
13
-
-
0003262137
-
The inevitability of failure: The flawed assumption of security in modern computing environments
-
P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The inevitability of failure: The flawed assumption of security in modern computing environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303-314, 1998.
-
(1998)
Proceedings of the 21st National Information Systems Security Conference
, pp. 303-314
-
-
Loscocco, P.A.1
Smalley, S.D.2
Muckelbauer, P.A.3
Taylor, R.C.4
Turner, S.J.5
Farrell, J.F.6
-
14
-
-
77955186544
-
TrustVisor: Efficient TCB reduction and attestation
-
May
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. TrustVisor: Efficient TCB reduction and attestation. In Proceedings of the IEEE Symposium on Security and Privacy, pages 143-158, May 2010.
-
(2010)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 143-158
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
17
-
-
70349750047
-
The Eucalyptus opensource cloud-computing system
-
D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov. The Eucalyptus opensource cloud-computing system. In Proceedings of the IEEE International Symposium on Cluster Computing and the Grid, pages 124-131, 2009.
-
(2009)
Proceedings of the IEEE International Symposium on Cluster Computing and the Grid
, pp. 124-131
-
-
Nurmi, D.1
Wolski, R.2
Grzegorczyk, C.3
Obertelli, G.4
Soman, S.5
Youseff, L.6
Zagorodnov, D.7
-
18
-
-
20344383743
-
Virtual machine monitors: Current technology and future trends
-
DOI 10.1109/MC.2005.176
-
M. Rosenblum and T. Garfinkel. Virtual machine monitors: Current technology and future trends. IEEE Computer, 38(5):39-47, May 2005. (Pubitemid 40784341)
-
(2005)
Computer
, vol.38
, Issue.5
, pp. 39-47
-
-
Rosenblum, M.1
Garfinkel, T.2
-
23
-
-
77954726625
-
Requirements for an integrity-protected hypervisor on the x86 hardware virtualized architecture
-
June
-
A. Vasudevan, J. M. McCune, N. Qu, L. van Doorn, and A. Perrig. Requirements for an integrity-protected hypervisor on the x86 hardware virtualized architecture. In Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, pages 141-165, June 2010.
-
(2010)
Proceedings of the 3rd International Conference on Trust and Trustworthy Computing
, pp. 141-165
-
-
Vasudevan, A.1
McCune, J.M.2
Qu, N.3
Van Doorn, L.4
Perrig, A.5
|