-
2
-
-
77950347409
-
A view of cloud computing
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, et al., "A View of Cloud Computing," ACM Communications, vol. 53, pp. 50-8, 2010.
-
(2010)
ACM Communications
, vol.53
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
-
3
-
-
78349299500
-
The management of security in cloud computing
-
S. Ramgovind, M. M. Eloff, and E. Smith, "The Management of Security in Cloud computing," in Information Security for South Africa (ISSA), pp. 1-7, 2010.
-
(2010)
Information Security for South Africa (ISSA)
, pp. 1-7
-
-
Ramgovind, S.1
Eloff, M.M.2
Smith, E.3
-
4
-
-
80052179341
-
Worth their watts? - An empirical study of datacenter servers
-
A. Vasan, A. Sivasubramaniam, V. Shimpi, T. Sivabalan, and R. Subbiah, "Worth their Watts? - An Empirical Study of Datacenter Servers," in High Performance Computer Architecture (HPCA), IEEE 16th International Symposium on, pp. 1-10, 2010.
-
(2010)
High Performance Computer Architecture (HPCA), IEEE 16th International Symposium on
, pp. 1-10
-
-
Vasan, A.1
Sivasubramaniam, A.2
Shimpi, V.3
Sivabalan, T.4
Subbiah, R.5
-
5
-
-
80052185561
-
-
OProfile. Available from: Last accessed on 2011 Feb 1
-
OProfile. Available from: http://oprofile.sourceforge.net [Last accessed on 2011 Feb 1].
-
-
-
-
7
-
-
77955131289
-
Can public-cloud security meet its unique challenges?
-
L. M. Kaufman, "Can Public-Cloud Security Meet Its Unique Challenges?," IEEE Security and Privacy, vol. 8, pp. 55-7, 2010.
-
(2010)
IEEE Security and Privacy
, vol.8
, pp. 55-57
-
-
Kaufman, L.M.1
-
8
-
-
85012229582
-
Security in the cloud
-
G. Anthes, "Security in the Cloud," ACM Communications vol. 53, pp. 16-8, 2010.
-
(2010)
ACM Communications
, vol.53
, pp. 16-18
-
-
Anthes, G.1
-
9
-
-
74049133176
-
Cloud security is not (just) virtualization security: A short paper
-
Chicago, Illinois, USA
-
M. Christodorescu, R. Sailer, D. L. Schales, D. Sgandurra, and D. Zamboni, "Cloud Security is not (just) Virtualization Security: A Short Paper," in Proceedings of the 2009 ACM workshop on Cloud Computing Security, Chicago, Illinois, USA, pp. 97-102, 2009.
-
(2009)
Proceedings of the 2009 ACM workshop on Cloud Computing Security
, pp. 97-102
-
-
Christodorescu, M.1
Sailer, R.2
Schales, D.L.3
Sgandurra, D.4
Zamboni, D.5
-
10
-
-
34548780687
-
Online data migration for autonomic provisioning of databases in dynamic content web servers
-
Toranto, Ontario, Canada
-
G. Soundararajan, and C. Amza, "Online Data Migration for Autonomic Provisioning of Databases in Dynamic Content Web Servers," in Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research, Toranto, Ontario, Canada, pp. 268-82, 2005.
-
Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative Research
, vol.2005
, pp. 268-282
-
-
Soundararajan, G.1
Amza, C.2
-
11
-
-
80052181552
-
-
Available from: Last accessed on 2011 Feb 1
-
P. Nicolas, Cloud Multitenancy. Available from: http://www. slideshare.net/pnicolas/cloudmultitenancy [Last accessed on 2011 Feb 1].
-
Cloud Multitenancy
-
-
Nicolas, P.1
-
13
-
-
80052172771
-
Virtualization security
-
Oak Ridge, Tennessee
-
E. Ray, and E. Schultz, "Virtualization Security," in Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, Oak Ridge, Tennessee, pp. 1-5, 2009.
-
(2009)
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
, pp. 1-5
-
-
Ray, E.1
Schultz, E.2
-
14
-
-
60349120237
-
The complexity of online memory checking
-
M. Naor, and G. N. Rothblum, "The Complexity of Online Memory Checking," Journal of the ACM, vol. 56, pp. 1-46, 2009.
-
(2009)
Journal of the ACM
, vol.56
, pp. 1-46
-
-
Naor, M.1
Rothblum, G.N.2
-
15
-
-
72749089553
-
Trusting the cloud
-
C. Cachin, I. Keidar, and A. Shraer, "Trusting the Cloud," SIGACT News, vol. 40, pp. 81-6, 2009.
-
(2009)
SIGACT News
, vol.40
, pp. 81-86
-
-
Cachin, C.1
Keidar, I.2
Shraer, A.3
-
16
-
-
0031233235
-
An identityauthentication system using fingerprints
-
A. K. Jain, H. Lin, S. Pankanti, and R. Bolle, "An Identityauthentication System using Fingerprints," in Proceedings of the IEEE, pp. 1365-88, 1997.
-
(1997)
Proceedings of the IEEE
, pp. 1365-1388
-
-
Jain, A.K.1
Lin, H.2
Pankanti, S.3
Bolle, R.4
-
17
-
-
80052159427
-
-
Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA. Technical Report NASTR-0030-2006
-
L. S. Clair, L. Johansen, K. Butler, W. Enck, M. Pirretti, P. Traynor, et al., "Password Exhaustion: Predicting the End of Password Usefulness," Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA. Technical Report NASTR- 0030-2006, 2007.
-
(2007)
Password Exhaustion: Predicting the End of Password Usefulness
-
-
Clair, L.S.1
Johansen, L.2
Butler, K.3
Enck, W.4
Pirretti, M.5
Traynor, P.6
-
18
-
-
27944460383
-
Efficient fingerprint-based user authentication for embedded systems
-
14.5, Proceedings 2005, 42nd Design Automation Conference, DAC 2005
-
P. Gupta, S. Ravi, A. Raghunathan, and N. K. Jha, "Efficient Fingerprint-based User Authentication for Embedded Systems," in Proceedings of the 42nd annual Design Automation Conference, Anaheim, California, USA, pp. 244-7, 2005. (Pubitemid 41675437)
-
(2005)
Proceedings - Design Automation Conference
, pp. 244-247
-
-
Gupta, P.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
19
-
-
67549132170
-
Fingerprint biometric based self-authentication and deniable authentication schemes for the electronic world
-
M. K. Khan, "Fingerprint Biometric based Self-Authentication and Deniable Authentication Schemes for the Electronic World," IETE Technical Review, vol. 26, pp. 191-5, 2010.
-
IETE Technical Review
, vol.26
, Issue.2010
, pp. 191-5
-
-
Khan, M.K.1
-
20
-
-
78049388700
-
Effects of equipment variation on speaker recognition error rates
-
presented at the, Dallas, Texas
-
C. Shaver, and J. M. Acken, "Effects of Equipment Variation on Speaker Recognition Error Rates," presented at the IEEE International Conference on Acoustics Speech and Signal Processing, Dallas, Texas, 2010.
-
(2010)
IEEE International Conference on Acoustics Speech and Signal Processing
-
-
Shaver, C.1
Acken, J.M.2
-
21
-
-
67549099270
-
Analysis, feature extraction, modeling and testing techniques for speaker recognition
-
H. S. Jayanna, and S. R. M. Prasanna, "Analysis, Feature Extraction, Modeling and Testing Techniques for Speaker Recognition," IETE Technical Review, vol. 26, pp. 181-90, 2009.
-
(2009)
IETE Technical Review
, vol.26
, pp. 181-190
-
-
Jayanna, H.S.1
Prasanna, S.R.M.2
-
22
-
-
77956257783
-
A context-aware access control model for pervasive environments
-
S. Al-Rwais, and J. Al-Muhtadi, "A Context-aware Access Control Model for Pervasive Environments," IETE Technical Review, vol. 27, pp. 371-9, 2010.
-
(2010)
IETE Technical Review
, vol.27
, pp. 371-379
-
-
S. Al-Rwais1
J. Al-Muhtadi2
-
23
-
-
74049103479
-
PORS: Proofs of retrievability for large files
-
Alexandria, Virginia, USA
-
A. Juels, and B. S. Kaliski Jr., "PORS: Proofs of Retrievability for Large Files," in Proceedings of the 14th ACM conference on Computer and communications security, Alexandria, Virginia, USA, pp. 584-97, 2007.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 584-597
-
-
Juels, A.1
Kaliski, Jr.B.S.2
-
24
-
-
80052170619
-
Statistical basics for testing and security of digital systems for identity authentication
-
presented at the, Florida
-
J. M. Acken, and L. E. Nelson, "Statistical Basics for Testing and Security of Digital Systems for Identity Authentication," presented at the 6th Int. Conf. on Computing, Communications and Control Technologies: CCCT2008, Florida, 2008.
-
(2008)
6th Int. Conf. on Computing, Communications and Control Technologies: CCCT2008
-
-
Acken, J.M.1
Nelson, L.E.2
-
25
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
DOI 10.1145/359340.359342
-
R. L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-key Cryptosystems," ACM Communications vol. 21, pp. 120-6, 1978. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
28
-
-
52649128991
-
Memory performance attacks: Denial of memory service in multi-core systems
-
Boston, MA
-
T. Moscibroda, and O. Mutlu, "Memory Performance Attacks: Denial of Memory Service in Multi-core Systems," in Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, Boston, MA, pp. 1-18, 2007.
-
(2007)
Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
, pp. 1-18
-
-
Moscibroda, T.1
Mutlu, O.2
-
29
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
Chicago, Illinois, USA
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: Exploring Information Leakage in Third-party Compute Clouds," in Proceedings of the 16th ACM conference on Computer and Communications Security, Chicago, Illinois, USA, pp. 199-212, 2009.
-
(2009)
Proceedings of the 16th ACM conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
30
-
-
33745640963
-
Cache attacks and counter-measures: The case of AES
-
DOI 10.1007/11605805-1, Topics in Cryptology - CT-RSA 2006: The Cryptographers' Track at the RSA Conference 2006, Proceedings
-
D. Osvik, A. Shamir, and E. Tromer, "Cache Attacks and Countermeasures: The Case of AES," in Topics in Cryptology - CT-RSA 2006. D. Pointcheval Ed., editor. Heidelberg: Springer Berlin; vol. 3860, pp. 1-20, 2006. (Pubitemid 43971699)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS3960
, pp. 1-20
-
-
Osvik, D.A.1
Shamir, A.2
Tromer, E.3
-
32
-
-
70350353222
-
Usable access control in collaborative environments: Authorization based on people-tagging
-
Saint-Malo, France
-
Q. Wang, H. Jin, and N. Li, "Usable Access Control in Collaborative Environments: Authorization based on People-tagging," in Proceedings of the 14th European conference on Research in Computer Security, Saint-Malo, France, pp. 268-84, 2009.
-
(2009)
Proceedings of the 14th European conference on Research in Computer Security
, pp. 268-84
-
-
Wang, Q.1
Jin, H.2
Li, N.3
-
33
-
-
60749127781
-
Defending against attacks on main memory persistence
-
W. Enck, K. Butler, T. Richardson, P. McDaniel, and A. Smith, "Defending Against Attacks on Main Memory Persistence," in Proceedings of the 2008 Annual Computer Security Applications Conference, pp. 65-74, 2008.
-
(2008)
Proceedings of the 2008 Annual Computer Security Applications Conference
, pp. 65-74
-
-
Enck, W.1
Butler, K.2
Richardson, T.3
P. McDaniel4
Smith, A.5
|