-
1
-
-
80052945517
-
-
Group of Virtualization and Cloud Computing. Beijing: Publishing House of Electronics Industry
-
Group of Virtualization and Cloud Computing. Virtualization and Cloud Computing [M]. Beijing: Publishing House of Electronics Industry, 2009.
-
(2009)
Virtualization and Cloud Computing
-
-
-
2
-
-
65749084065
-
Cloud computing: System instances and current research
-
CHAN K, ZHENG W M. Cloud computing: system instances and current research [J]. Journal of Software, 2009, 20(5): 1337-1348.
-
(2009)
Journal of Software
, vol.20
, Issue.5
, pp. 1337-1348
-
-
Chan, K.1
Zheng, W.M.2
-
3
-
-
54049106582
-
Virtual machine introspection: Observation or interference
-
NANCE K, BISHOP M, HAY B. Virtual machine introspection: observation or interference? [J]. IEEE Security and Privacy, 2008, 6(5): 32-37.
-
(2008)
IEEE Security and Privacy
, vol.6
, Issue.5
, pp. 32-37
-
-
Nance, K.1
Bishop, M.2
Hay, B.3
-
4
-
-
77954051808
-
The nist definition of cloud computing
-
National Institute of Standards and Technology
-
MELL P, GRANCE T. The Nist Definition of Cloud Computing [S]. National Institute of Standards and Technology, 2009,
-
(2009)
-
-
Mell, P.1
Grance, T.2
-
5
-
-
21644433634
-
Xen and the art of virtualization
-
Bolton Landing, NY, USA
-
BARHAM P, DRAGOVIC B, FRASER K, et al. Xen and the art of virtualization [A]. Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles [C]. Bolton Landing, NY, USA. 2003: 164-177.
-
(2003)
Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
-
6
-
-
33750248123
-
Building a MAC-based security architecture for the Xen open-source hypervisor
-
Washington, DC, USA
-
SAILER R, JAEGER T, VALDEZ E, et al. Building a MAC-based security architecture for the Xen open-source hypervisor [A]. Proceedings of the Computer Security Applications Conference [C]. Washington, DC, USA. 2005. 276-285.
-
(2005)
Proceedings of the Computer Security Applications Conference
, pp. 276-285
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
-
7
-
-
51949119355
-
sHype: Secure hypervisor approach to trusted virtualized systems
-
IBM Research Report RC23511
-
SAILER R, VALDEZ E, JAEGER T, et al. sHype: Secure Hypervisor Approach to Trusted Virtualized Systems [R]. IBM Research Report RC23511, 2005, 1-12.
-
(2005)
, pp. 1-12
-
-
Sailer, R.1
Valdez, E.2
Jaeger, T.3
-
8
-
-
38349041413
-
A layered approach to simplified access control in virtualized systems
-
PAYNE B D, SAILER R, CACERES R, et al. A layered approach to simplified access control in virtualized systems [J]. SIGOPS Oper Syst Rev, 2007, 41(4): 12-19.
-
(2007)
SIGOPS Oper Syst Rev
, vol.41
, Issue.4
, pp. 12-19
-
-
Payne, B.D.1
Sailer, R.2
Caceres, R.3
-
9
-
-
78650019783
-
HyperSentry: Enabling stealthy in-context measurement of hypervisor integrity
-
Chicago, Illinois, USA
-
AZAB A M, NING P, WANG Z, et al. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity [A]. Proceedings of the 17th ACM conference on Computer and communications security [C]. Chicago, Illinois, USA. 2010: 38-49.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 38-49
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
-
10
-
-
77957969195
-
Covert channel research
-
WANG Y J, WU J Z, ZENG H T, et al. Covert channel research [J]. Journal of Software, 2010, 21(9): 2262-2288.
-
(2010)
Journal of Software
, vol.21
, Issue.9
, pp. 2262-2288
-
-
Wang, Y.J.1
Wu, J.Z.2
Zeng, H.T.3
-
11
-
-
0015672289
-
A note on the confinement problem
-
BUTLER W L. A note on the confinement problem [J]. Commun ACM, 1973, 16(10): 613-615.
-
(1973)
Commun ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Butler, W.L.1
-
12
-
-
80052935703
-
Improving performance of network covert timing channel through huffman coding
-
Gwangju, Korea. Dec 9-11
-
WU J Z, WANG Y J, DING L P, et al. Improving performance of network covert timing channel through huffman coding [A]. The 2010 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA 2010) [C]. Gwangju, Korea. Dec 9-11, 2010. 512-521.
-
(2010)
The 2010 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA 2010)
, pp. 512-521
-
-
Wu, J.Z.1
Wang, Y.J.2
Ding, L.P.3
-
14
-
-
65349144517
-
New definition of small message criterion and its application in transaction covert channel mitigating
-
ZENG H T, WANG Y J, ZU W, et al. New definition of small message criterion and its application in transaction covert channel mitigating [J]. Journal of Software, 2009, 20(4): 985-996.
-
(2009)
Journal of Software
, vol.20
, Issue.4
, pp. 985-996
-
-
Zeng, H.T.1
Wang, Y.J.2
Zu, W.3
-
15
-
-
51649119359
-
Covert channel mitigation method for secure real-time database using capacity metric
-
ZENG H T, WANG Y J, RUAN L, et al. Covert channel mitigation method for secure real-time database using capacity metric [J]. Journal on Communications, 2008, 29(8): 46-56.
-
(2008)
Journal on Communications
, vol.29
, Issue.8
, pp. 46-56
-
-
Zeng, H.T.1
Wang, Y.J.2
Ruan, L.3
-
16
-
-
44449087948
-
A survey of covert channels and countermeasures in computer network protocols
-
ZANDER S, ARMITAGE G, BRANCH P. A survey of covert channels and countermeasures in computer network protocols [J]. Communications Surveys & Tutorials, IEEE, 2007, 9(3): 44-57.
-
(2007)
Communications Surveys & Tutorials, IEEE
, vol.9
, Issue.3
, pp. 44-57
-
-
Zander, S.1
Armitage, G.2
Branch, P.3
-
17
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
Chicago, Illinois, USA
-
RISTENPART T, TROMER E, SHACHAM H, et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds [A]. Proceedings of the 16th ACM conference on Computer and communications security [C]. Chicago, Illinois, USA, 2009. 199-212.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
-
19
-
-
80052666134
-
Identification and evaluation of sharing memory covert timing channel in xen virtual machines
-
Washington, DC, USA
-
WU J Z, DING L P, WANG Y J, et al. Identification and evaluation of sharing memory covert timing channel in xen virtual machines [A]. Proceedings of the Cloud Computing (CLOUD), 2011 IEEE International Conference on [C]. Washington, DC, USA, 2011. 283-291.
-
(2011)
Proceedings of the Cloud Computing (CLOUD), 2011 IEEE International Conference on
, pp. 283-291
-
-
Wu, J.Z.1
Ding, L.P.2
Wang, Y.J.3
-
20
-
-
78650158728
-
Determinating timing channels in compute clouds
-
Chicago, Illinois, USA
-
AVIRAM A, HU S, FORD B, et al. Determinating timing channels in compute clouds [A]. Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop [C]. Chicago, Illinois, USA, 2010. 103-108.
-
(2010)
Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop
, pp. 103-108
-
-
Aviram, A.1
Hu, S.2
Ford, B.3
-
21
-
-
70349733402
-
Covert channels in ad-hoc wireless networks
-
LI S, EPHREMIDES A. Covert channels in ad-hoc wireless networks [J]. Ad Hoc Netw, 2010, 8(2): 135-147.
-
(2010)
Ad Hoc Netw
, vol.8
, Issue.2
, pp. 135-147
-
-
Li, S.1
Ephremides, A.2
-
23
-
-
12844265899
-
Covert channel analysis in secure operating systems with high security levels
-
QING S H. Covert channel analysis in secure operating systems with high security levels [J]. Journal of Software, 2004, 15(12): 1837-1849.
-
(2004)
Journal of Software
, vol.15
, Issue.12
, pp. 1837-1849
-
-
Qing, S.H.1
-
25
-
-
80052931252
-
A Practical covert channel identification approach in source code based on directed information flow graph
-
Jeju Island, Korea
-
WU J Z, DING L P, WANG Y J, et al. A Practical covert channel identification approach in source code based on directed information flow graph [A]. Proceedings of the Secure Software Integration and Reliability Improvement (SSIRI), 2011 Fifth International Conference on [C]. Jeju Island, Korea. 2011. 98-107.
-
(2011)
Proceedings of the Secure Software Integration and Reliability Improvement (SSIRI), 2011 Fifth International Conference on
, pp. 98-107
-
-
Wu, J.Z.1
Ding, L.P.2
Wang, Y.J.3
-
26
-
-
78650404228
-
Covert channel resistant information leakage protection using a multi-agent architecture
-
BISHOP S, OKHRAVI H, RAHIMI S, et al. Covert channel resistant information leakage protection using a multi-agent architecture [J]. Information Security, IET, 2010, 4(4): 233-247.
-
(2010)
Information Security, IET
, vol.4
, Issue.4
, pp. 233-247
-
-
Bishop, S.1
Okhravi, H.2
Rahimi, S.3
-
27
-
-
70349665526
-
Traffic controller: A practical approach to block network covert timing channel
-
WANG Y, CHEN P, GE Y, et al. Traffic controller: a practical approach to block network covert timing channel [A]. Proceedings of the Availability, Reliability and Security, 2009 ARES'09 International Conference on [C]. 2009. 349-354.
-
(2009)
Proceedings of the Availability, Reliability and Security, 2009 ARES'09 International Conference on
, pp. 349-354
-
-
Wang, Y.1
Chen, P.2
Ge, Y.3
-
28
-
-
77953309328
-
On adversarial games in dynamic spectrum access networking based covert timing channels
-
SENGUPTA S, ANAND S, HONG K, et al. On adversarial games in dynamic spectrum access networking based covert timing channels? [J]. SIGMOBILE Mob Comput Commun Rev, 2009, 13(2): 96-107.
-
(2009)
SIGMOBILE Mob Comput Commun Rev
, vol.13
, Issue.2
, pp. 96-107
-
-
Sengupta, S.1
Anand, S.2
Hong, K.3
-
29
-
-
0004226996
-
-
Beijing: New Start Press
-
KELLY K. Out of Control [M]. Beijing: New Start Press, 2010.
-
(2010)
Out of Control
-
-
Kelly, K.1
-
30
-
-
44649194096
-
Cloud computing
-
IBM Whitepaper
-
BOSS G, MALLADI P, QUAN D, et al. Cloud computing [R]. IBM Whitepaper. 2007.
-
(2007)
-
-
Boss, G.1
Malladi, P.2
Quan, D.3
-
31
-
-
81355126572
-
-
UCB/EECS-2009-28. EECS Department, University of California, Berkeley
-
ARMBRUST M, FOX A, GRIFFITH R, et al. UCB/EECS-2009-28 [R]. EECS Department, University of California, Berkeley, 2009.
-
(2009)
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
-
32
-
-
77950347409
-
A view of cloud computing
-
ARMBRUST M, FOX A, GRIFFITH R, et al. A view of cloud computing [J]. Commun ACM, 2010, 53(4): 50-58.
-
(2010)
Commun ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
-
33
-
-
65749112026
-
Amazon elastic compute cloud (Amazon EC2)
-
Amazon elastic compute cloud (Amazon EC2) [EB/OL]. http://aws.amazon.com/ec2/. 2009.
-
(2009)
-
-
-
34
-
-
84863179597
-
Google app engine
-
Google app engine [EB/OL]. http://code.google.com/appengine/. 2009.
-
(2009)
-
-
-
35
-
-
81355126569
-
Business CRM solutions
-
Business CRM Solutions [EB/OL]. http://www.salesforce.com/crm/.
-
-
-
-
36
-
-
81355137387
-
-
UCB/EECS-2010-5: EECS Department, University of California, Berkeley
-
CHEN Y, PAXSON V, KATZ R H. UCB/EECS-2010-5 [R]: EECS Department, University of California, Berkeley, 2010.
-
(2010)
-
-
Chen, Y.1
Paxson, V.2
Katz, R.H.3
-
37
-
-
79751493181
-
Locking the sky: A survey on IaaS cloud security
-
VAQUERO L, RODERO-MERINO L, MOR N D. Locking the sky: a survey on IaaS cloud security [J]. Computing, 2011, 91(1): 93-118.
-
(2011)
Computing
, vol.91
, Issue.1
, pp. 93-118
-
-
Vaquero, L.1
Rodero-Merino, L.2
Mor, N.D.3
-
38
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
Oakland, CA
-
PAYNE B D, CARBONE M, SHARIF M, et al. Lares: an architecture for secure active monitoring using virtualization [A]. 2008 IEEE Symposium on Security and Privacy [C]. Oakland, CA, 2008. 233-247.
-
(2008)
2008 IEEE Symposium on Security and Privacy
, pp. 233-247
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.3
-
39
-
-
79951999348
-
Study on cloud computing security
-
FENG D G, ZHANG M, ZHANG Y, et al. Study on cloud computing security [J]. Journal of Software, 2011, 22(1): 71-83.
-
(2011)
Journal of Software
, vol.22
, Issue.1
, pp. 71-83
-
-
Feng, D.G.1
Zhang, M.2
Zhang, Y.3
-
40
-
-
41949123110
-
Research and development of botnets
-
ZHUGE J W, HAN X H, ZHOU Y L, et al. Research and development of botnets [J]. Journal of Software, 2008, 19(3): 702-715.
-
(2008)
Journal of Software
, vol.19
, Issue.3
, pp. 702-715
-
-
Zhuge, J.W.1
Han, X.H.2
Zhou, Y.L.3
-
42
-
-
77955197190
-
Side-channel leaks in web applications: A reality today, a challenge tomorrow
-
CHEN S, WANG R, WANG X, et al.Side-channel leaks in web applications: a reality today, a challenge tomorrow [A]. 2010 IEEE Symposium on Security and Privacy [C]. 2010. 191-206.
-
(2010)
2010 IEEE Symposium on Security and Privacy
, pp. 191-206
-
-
Chen, S.1
Wang, R.2
Wang, X.3
-
43
-
-
77955212682
-
HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
WANG Z, JIANG X. HyperSafe: a lightweight approach to provide lifetime hypervisor control-flow integrity [A]. 2010 IEEE Symposium on Security and Privacy [C]. 2010. 380-395.
-
(2010)
2010 IEEE Symposium on Security and Privacy
, pp. 380-395
-
-
Wang, Z.1
Jiang, X.2
-
44
-
-
0003969633
-
Trusted computer system evaluation criteria
-
CENTER N C S. Trusted Computer System Evaluation Criteria [S]. 1985.
-
(1985)
-
-
Center, N.C.S.1
-
45
-
-
0003765587
-
Common criteria for information technology security evaluation
-
ISO/IEC. ISO Online Catalogue
-
ISO/IEC. Common Criteria for Information Technology Security Evaluation [S]. ISO Online Catalogue, 2005.
-
(2005)
-
-
-
46
-
-
77957969551
-
Classified oriteria for security protection of computer information system
-
GB17859-1999
-
GB17859-1999. Classified Oriteria for Security Protection of Computer Information System [S]. 2001.
-
(2001)
-
-
-
47
-
-
58149161807
-
Information security technology - Security techniques requirement for operating system
-
GB/T20272-2006
-
GB/T20272-2006. Information Security Technology - Security Techniques Requirement for Operating System [S]. 2006.
-
(2006)
-
-
-
48
-
-
84948947266
-
A practical approach to identifying storage and timing channels: Twenty years later
-
LAS VEGAS, NV
-
KEMMERER R A. A practical approach to identifying storage and timing channels: twenty years later [A]. 18th Annual Computer Security Applications Conference [C]. LAS VEGAS, NV, 2002. 109-118.
-
(2002)
18th Annual Computer Security Applications Conference
, pp. 109-118
-
-
Kemmerer, R.A.1
-
49
-
-
0026260664
-
Covert flow trees: A visual approach to analyzing covert storage channels
-
KEMMERER R A, PORRAS P A. Covert flow trees: a visual approach to analyzing covert storage channels [J]. IEEE Transactions on Software Engineering. 1991, 17(11): 1166-1185.
-
(1991)
IEEE Transactions on Software Engineering
, vol.17
, Issue.11
, pp. 1166-1185
-
-
Kemmerer, R.A.1
Porras, P.A.2
-
50
-
-
84976667065
-
Shared resource matrix methodology: An approach to identifying storage and timing channels
-
KEMMERER R A. Shared resource matrix methodology: an approach to identifying storage and timing channels [J]. ACM Trans Comput Syst, 1983, 1(3): 256-277.
-
(1983)
ACM Trans Comput Syst
, vol.1
, Issue.3
, pp. 256-277
-
-
Kemmerer, R.A.1
-
52
-
-
0016949746
-
A lattice model of secure information flow
-
DENNING D E. A lattice model of secure information flow [J]. Commun ACM, 1976, 19(5): 236-243.
-
(1976)
Commun ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
53
-
-
8644251330
-
Covet channel analysis on ANSHENG secure operating system
-
QING S H, ZHU J F. Covet channel analysis on ANSHENG secure operating system [J]. Journal of Software, 2004, 15(09): 1385-1392.
-
(2004)
Journal of Software
, vol.15
, Issue.9
, pp. 1385-1392
-
-
Qing, S.H.1
Zhu, J.F.2
-
56
-
-
77957960630
-
Research on covert channel measurement and handling in secure real-time database
-
BeiJing; Graduate School of the Chinese Academy of Sciences
-
ZENG H T. Research on Covert Channel Measurement and Handling in Secure Real-time Database [D]. BeiJing; Graduate School of the Chinese Academy of Sciences, 2008.
-
(2008)
-
-
Zeng, H.T.1
-
57
-
-
0003400251
-
Secure computer systems: Mathematical foundations
-
MITRE CORP
-
BELL D, LA PADULA L. Secure Computer Systems: Mathematical Foundations [R]. MITRE CORP, 1973.
-
(1973)
-
-
Bell, D.1
La Padula, L.2
-
59
-
-
0027848097
-
Database concurrency control in multilevel secure database management systems
-
KEEFE T F, TSAI W T, SRIVASTAVA J. Database concurrency control in multilevel secure database management systems [J]. IEEE Transactions on Knowledge and Data Engineering, 1993, 5(6): 1039-1055.
-
(1993)
IEEE Transactions on Knowledge and Data Engineering
, vol.5
, Issue.6
, pp. 1039-1055
-
-
Keefe, T.F.1
Tsai, W.T.2
Srivastava, J.3
-
64
-
-
76849086598
-
IP covert channel detection
-
CABUK S, BRODLEY C E, SHIELDS C. IP covert channel detection [J]. ACM Trans Inf Syst Secur, 2009, 12(4): 1-29.
-
(2009)
ACM Trans Inf Syst Secur
, vol.12
, Issue.4
, pp. 1-29
-
-
Cabuk, S.1
Brodley, C.E.2
Shields, C.3
-
67
-
-
38049087058
-
Detection of covert channel encoding in network packet delays
-
Department of Computer Science, Dartmouth College, Technical Report TR2005536
-
BERK V, GIANI A, CYBENKO G, et al. Detection of Covert Channel Encoding in Network Packet Delays [R]. Department of Computer Science, Dartmouth College, Technical Report TR2005536, 2005
-
(2005)
-
-
Berk, V.1
Giani, A.2
Cybenko, G.3
-
69
-
-
71849083789
-
A study of on/off timing channel based on packet delay distribution
-
YAO L, ZI X, PAN L, et al. A study of on/off timing channel based on packet delay distribution [J]. Computers & Security, 2009, 28(8): 785-794.
-
(2009)
Computers & Security
, vol.28
, Issue.8
, pp. 785-794
-
-
Yao, L.1
Zi, X.2
Pan, L.3
-
72
-
-
2642558406
-
Covert channels in the TCP/IP protocol suite, First Monday
-
1997-5-5
-
ROWLAND C. Covert channels in the TCP/IP protocol suite, First Monday [EB/OL]. http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/ fm/article/viewArticle/528/449, 1997-5-5.
-
-
-
Rowland, C.1
-
73
-
-
77955419362
-
Implementing a passive network covert timing channel
-
ZI X, YAO L, PAN L, et al. Implementing a passive network covert timing channel [J]. Computers & Security, 2010, 29(6): 686-696.
-
(2010)
Computers & Security
, vol.29
, Issue.6
, pp. 686-696
-
-
Zi, X.1
Yao, L.2
Pan, L.3
-
74
-
-
70349682314
-
TCP/IP timing channels: Theory to implementation
-
Brizal
-
SELLKE S H, CHIH-CHUN W, BAGCHI S, et al. TCP/IP timing channels: theory to implementation [A]. 2009 INFOCOM [C]. Brizal, 2009. 2204-2212.
-
(2009)
2009 INFOCOM
, pp. 2204-2212
-
-
Sellke, S.H.1
Chih-Chun, W.2
Bagchi, S.3
-
75
-
-
70350353526
-
Hide and seek in time-robust covert timing channels
-
LNCS 5789
-
LIU Y, GHOSAL D, ARMKNECHT F, et al. Hide and seek in time-robust covert timing channels [A]. ESORICS 2009 [C]. LNCS 5789. 2009. 120-135.
-
(2009)
ESORICS 2009
, pp. 120-135
-
-
Liu, Y.1
Ghosal, D.2
Armknecht, F.3
-
76
-
-
38049169779
-
Noisy timing channels with binary inputs and outputs
-
IH 2006, LNCS 4437
-
MARTIN K, MOSKOWITZ I. Noisy timing channels with binary inputs and outputs [J]. IH 2006, LNCS 4437 [C]. 2007. 124-144.
-
(2007)
, pp. 124-144
-
-
Martin, K.1
Moskowitz, I.2
-
77
-
-
70350213805
-
A method for the construction of minimum-redundancy codes
-
HUFFMAN D. A method for the construction of minimum-redundancy codes [J]. Resonance, 2006, 11(2): 91-99.
-
(2006)
Resonance
, vol.11
, Issue.2
, pp. 91-99
-
-
Huffman, D.1
-
81
-
-
67649823284
-
A formal framework for real-time information flow analysis
-
SON J, ALVES-FOSS J. A formal framework for real-time information flow analysis [J]. Computers & Security, 2009, 28(6): 421-432.
-
(2009)
Computers & Security
, vol.28
, Issue.6
, pp. 421-432
-
-
Son, J.1
Alves-Foss, J.2
-
83
-
-
0036715113
-
An information-theoretic and game-theoretic study of timing channels
-
GILES J, HAJEK B. An information-theoretic and game-theoretic study of timing channels [J]. IEEE Transactions on information Theory, 2002, 48(9): 2455-2477.
-
(2002)
IEEE Transactions on information Theory
, vol.48
, Issue.9
, pp. 2455-2477
-
-
Giles, J.1
Hajek, B.2
-
87
-
-
0023855640
-
A bandwidth computation model for covert storage channels and its applications
-
Oakland, CA
-
TSAI C-R, GLIGOR V D. A bandwidth computation model for covert storage channels and its applications [A]. IEEE Symposium on Security and Privacy [C]. Oakland, CA, 1988. 108-121.
-
(1988)
IEEE Symposium on Security and Privacy
, pp. 108-121
-
-
Tsai, C.-R.1
Gligor, V.D.2
-
88
-
-
0036494997
-
Maintaining security and timeliness in real-time database system
-
AHMED Q N, VRBSKY S V. Maintaining security and timeliness in real-time database system [J]. Journal of Systems and Software, 2002, 61(1): 15-29.
-
(2002)
Journal of Systems and Software
, vol.61
, Issue.1
, pp. 15-29
-
-
Ahmed, Q.N.1
Vrbsky, S.V.2
-
89
-
-
0028566761
-
Covert channels - here to stay
-
MOSKOWITZ I S, KANG M H. Covert channels - here to stay? [A]. COMPASS'94 [C]. 1994. 235-243.
-
(1994)
COMPASS'94
, pp. 235-243
-
-
Moskowitz, I.S.1
Kang, M.H.2
-
90
-
-
77957962695
-
Open cloud manifesto
-
MANIFESTO O C. Open cloud manifesto [EB/OL]. www.opencloudmanifesto.org. 2009.
-
(2009)
-
-
Manifesto, O.C.1
-
91
-
-
78650052308
-
An In-VM measuring framework for increasing virtual machine security in clouds
-
LIU Q, WENG C, LI M, et al. An In-VM Measuring Framework for Increasing Virtual Machine Security in Clouds [J]. IEEE Security and Privacy, 2010, 8(6): 56-62.
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.6
, pp. 56-62
-
-
Liu, Q.1
Weng, C.2
Li, M.3
-
92
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
GARFINKEL T, PFAFF B, CHOW J, et al. Terra: a virtual machine-based platform for trusted computing [J]. SIGOPS Oper Syst Rev, 2003, 37(5): 193-206.
-
(2003)
SIGOPS Oper Syst Rev
, vol.37
, Issue.5
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
-
93
-
-
77950820630
-
HIMA: A hypervisor-based integrity measurement agent
-
Hawaii, USA
-
AZAB A M, NING P, SEZER E C, et al. HIMA: a hypervisor-based integrity measurement agent [A]. Proceedings of the 2009 Annual Computer Security Applications Conference [C]. Hawaii, USA, 2009. 461-470.
-
(2009)
Proceedings of the 2009 Annual Computer Security Applications Conference
, pp. 461-470
-
-
Azab, A.M.1
Ning, P.2
Sezer, E.C.3
-
94
-
-
70449824733
-
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
SESHADRI A, LUK M, QU N, et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes [J]. SIGOPS Oper Syst Rev, 2007, 41(6): 335-350.
-
(2007)
SIGOPS Oper Syst Rev
, vol.41
, Issue.6
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
-
95
-
-
70450080729
-
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
-
Lisbon, Portugal
-
KIL C, SEZER E C, AZAB A M, et al. Remote attestation to dynamic system properties: Towards providing complete system integrity evidence [A]. DSN 2009 [C]. Lisbon, Portugal, 2009. 115-124.
-
(2009)
DSN 2009
, pp. 115-124
-
-
Kil, C.1
Sezer, E.C.2
Azab, A.M.3
-
96
-
-
84855404052
-
Hypervisor support for identifying covertly executing binaries
-
San Jose, CA
-
LITTY L, ANDRES H, LIE D. Hypervisor support for identifying covertly executing binaries [A]. USENIX Security Symposium [C]. San Jose, CA, 2008. 243-258.
-
(2008)
USENIX Security Symposium
, pp. 243-258
-
-
Litty, L.1
Andres, H.2
Lie, D.3
-
97
-
-
79951490425
-
TCvisor: A hypervisor level secure storage
-
London
-
REZAEI M, MOOSAVI N S, NEMATI H, et al. TCvisor: a hypervisor level secure storage [A]. Proceedings of the Internet Technology and Secured Transactions (ICITST), 2010 International Conference for [C]. London, 2010. 1-9.
-
(2010)
Proceedings of the Internet Technology and Secured Transactions (ICITST), 2010 International Conference for
, pp. 1-9
-
-
Rezaei, M.1
Moosavi, N.S.2
Nemati, H.3
-
98
-
-
77953210383
-
seL4: Formal verification of an operating-system kernel
-
KLEIN G, ANDRONICK J, ELPHINSTONE K, et al. seL4: formal verification of an operating-system kernel [J]. Commun ACM, 2010, 53(6): 107-15.
-
(2010)
Commun ACM
, vol.53
, Issue.6
, pp. 107-15
-
-
Klein, G.1
Andronick, J.2
Elphinstone, K.3
|