-
3
-
-
77956385334
-
-
Cloud computing. http://en.wikipedia.org/wiki/Cloud-computing.
-
Cloud Computing
-
-
-
4
-
-
78650019783
-
Hypersentry: Enabling stealthy in-context measurement of hypervisor integrity
-
A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky. Hypersentry: enabling stealthy in-context measurement of hypervisor integrity. In Proceedings of the 17th ACM conference on Computer and communications security, pages 38-49, 2010.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 38-49
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
5
-
-
21644433634
-
Xen and the art of virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proceedings of the nineteenth ACM symposium on Operating systems principles, 2003.
-
(2003)
Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
7
-
-
85032385433
-
Infrastructure security: Getting to the bottom of compliance in the cloud
-
S. Curry, J. Darbyshire, D. W. Fisher, B. Hartman, S. Herrod, V. Kumar, F. Martins, S. Orrin, and D. E. Wolf. Infrastructure security: Getting to the bottom of compliance in the cloud. In RSA Security Brief, 2010.
-
(2010)
RSA Security Brief
-
-
Curry, S.1
Darbyshire, J.2
Fisher, D.W.3
Hartman, B.4
Herrod, S.5
Kumar, V.6
Martins, F.7
Orrin, S.8
Wolf, D.E.9
-
8
-
-
70449640065
-
A logic of secure systems and its application to trusted computing
-
A. Datta, J. Franklin, D. Garg, and D. Kaynar. A logic of secure systems and its application to trusted computing. In IEEE Symposium on Security and Privacy, pages 221-236, 2009.
-
(2009)
IEEE Symposium on Security and Privacy
, pp. 221-236
-
-
Datta, A.1
Franklin, J.2
Garg, D.3
Kaynar, D.4
-
9
-
-
77955216681
-
Scalable parametric verification of secure systems: How to verify reference monitors without worrying about data structure size
-
J. Franklin, S. Chaki, A. Datta, and A. Seshadri. Scalable parametric verification of secure systems: How to verify reference monitors without worrying about data structure size. In IEEE Symposium on Security and Privacy, pages 365-379, 2010.
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 365-379
-
-
Franklin, J.1
Chaki, S.2
Datta, A.3
Seshadri, A.4
-
10
-
-
77955961955
-
A case for the accountable cloud
-
April
-
A. Haeberlen. A case for the accountable cloud. SIGOPS Oper. Syst. Rev., 44:52-57, April 2010.
-
(2010)
SIGOPS Oper. Syst. Rev.
, vol.44
, pp. 52-57
-
-
Haeberlen, A.1
-
11
-
-
80053145661
-
Accountable virtual machines
-
A. Haeberlen, P. Aditya, R. Rodrigues, and P. Druschel. Accountable virtual machines. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, pages 1-16, 2010.
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation
, pp. 1-16
-
-
Haeberlen, A.1
Aditya, P.2
Rodrigues, R.3
Druschel, P.4
-
13
-
-
72249120603
-
Sel4: Formal verification of an os kernel
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. sel4: formal verification of an os kernel. In Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, pages 207-220, 2009.
-
(2009)
Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles
, pp. 207-220
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
15
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
Proceedings New Security Paradigms Workshop 2004
-
A.-R. Sadeghi and C. Stüble. Property-based attestation for computing platforms: caring about properties, not mechanisms. In Proceedings of the 2004 workshop on New security paradigms, pages 67-77, 2004. (Pubitemid 41832903)
-
(2005)
Proceedings New Security Paradigms Workshop
, pp. 67-77
-
-
Sadeghi, A.-R.1
Stuble, C.2
-
18
-
-
80053150702
-
-
Trusted Computing Group. http://www.trustedcomputinggroup.org/.
-
-
-
-
20
-
-
80053161153
-
-
Xen. http://www.xen.org/.
-
-
-
|