-
2
-
-
34547540315
-
Deconstructing process isolation
-
DOI 10.1145/1178597.1178599, 1178599, Proceedings of the 2006 ACM SIGPLAN Workshop on Memory Systems Performance and Correctness, MSPC 2006
-
M. Aiken, M. Fähndrich, C. Hawblitzel, G. Hunt, and J. Larus Deconstructing process isolation Proceedings of the 2006 workshop on memory system performance and correctness (MSPC'06) October 2006 1 10 (Pubitemid 47177297)
-
(2006)
Proceedings of the 2006 ACM SIGPLAN Workshop on Memory Systems Performance and Correctness, MSPC 2006
, pp. 1-10
-
-
Aiken, M.1
Fahndrich, M.2
Hawblitzel, C.3
Hunt, G.4
Larus, J.5
-
6
-
-
33750931958
-
Secure and reliable java-based middleware - Challenges and solutions
-
DOI 10.1109/ARES.2006.120, 1625371, Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
-
W. Binder Secure and reliable Java-based middleware - challenges and solutions Proceedings of the first international Conference on availability, reliability and security 2006 (ARES'06) April 2006 662 669 (Pubitemid 44732705)
-
(2006)
Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
, vol.2006
, pp. 662-669
-
-
Binder, W.1
-
7
-
-
0035551933
-
Portable resource control in Java: The J-SEAL2 approach
-
W. Binder, and J.G. Hulaas Portable resource control in java - the J-SEAL2 approach Proceedings of the 2001 16th ACM SIGPLAN conference on object oriented programming, systems, languages and applications (OOPSLA'01) October 2001 139 155 (Pubitemid 35009063)
-
(2001)
Proceedings of the Conference on Object-Oriented Programming Systems, Languages, and Applications, OOPSLA
, vol.36
, pp. 139-155
-
-
Binder, W.1
Hulaas, J.G.2
Villazon, A.3
-
8
-
-
33750036408
-
Exact and Portable Profiling for the JVM Using Bytecode Instruction Counting
-
DOI 10.1016/j.entcs.2006.07.011, PII S1571066106004907
-
W. Binder, and J. Hulaas Exact and portable profiling for the JVM using bytecode instruction counting Electronic Notes in Theoretical Computer Science 164 October 2006 45 64 (Pubitemid 44584821)
-
(2006)
Electronic Notes in Theoretical Computer Science
, vol.164
, Issue.3 SPEC. ISS.
, pp. 45-64
-
-
Binder, W.1
Hulaas, J.2
-
10
-
-
78650059341
-
Toward a multi-tenancy authorization system for cloud services
-
J.M.A. Calero, N. Edwards, J. Kirschnick, L. Wilcock, and M. Wray Toward a multi-tenancy authorization system for cloud services IEEE Security and Privacy 8 December 2010 48 55
-
(2010)
IEEE Security and Privacy
, vol.8
, pp. 48-55
-
-
Calero, J.M.A.1
Edwards, N.2
Kirschnick, J.3
Wilcock, L.4
Wray, M.5
-
11
-
-
24644483315
-
Java-MOP: A monitoring oriented programming environment for java
-
Tools and Algorithms for the Construction and Analysis of Systems - 11th Int. Conference, TACAS 2005, held as part of the Joint European Conf. on Theory and Practice of Software, ETAPS 2005, Proc.
-
F. Chen, and R. Grigore Java-MOP: a monitoring oriented programming environment for Java Proceedings of the 11th international conference on tools and algorithms for the construction and analysis of systems (TACAS'05) Lecture notes in computer science Vol. 3440 April 2005 Springer 546 550 (Pubitemid 41282531)
-
(2005)
Lecture Notes in Computer Science
, vol.3440
, pp. 546-550
-
-
Chen, F.1
Rosu, G.2
-
12
-
-
44949094290
-
Aneka: Next-generation enterprise grid platform for e-science and e-business
-
X. Chu, K. Nadiminti, C. Jin, S. Venugopal, and R. Buyya Aneka: next-generation enterprise grid platform for e-science and e-business Proceedings of the 3rd IEEE international conference on e-science and grid computing (eScience'07) December 2007 151 159
-
(2007)
Proceedings of the 3rd IEEE International Conference on E-science and Grid Computing (eScience'07)
, pp. 151-159
-
-
Chu, X.1
Nadiminti, K.2
Jin, C.3
Venugopal, S.4
Buyya, R.5
-
13
-
-
78650607483
-
From a generic framework for expressing integrity properties to a dynamic MAC enforcement for operating systems
-
Springer
-
P. Clemente, J. Rouzaud-Cornabas, and C. Toinard From a generic framework for expressing integrity properties to a dynamic MAC enforcement for operating systems. Transactions on computational science XI 2010 Springer pp. 131-161
-
(2010)
Transactions on Computational Science
, vol.11
, pp. 131-161
-
-
Clemente, P.1
Rouzaud-Cornabas, J.2
Toinard, C.3
-
17
-
-
13244298339
-
A resource management interface for the java platform
-
G. Czajkowski, S. Hahn, G. Skinner, P. Soper, and C. Bryce A resource management interface for the java platform Software: Practice and Experience 35 November 2004 123 157
-
(2004)
Software: Practice and Experience
, vol.35
, pp. 123-157
-
-
Czajkowski, G.1
Hahn, S.2
Skinner, G.3
Soper, P.4
Bryce, C.5
-
19
-
-
33749065342
-
Developing an OSGi-like service platform for.NET
-
DOI 10.1109/CCNC.2006.1593018, 1593018, 2006 3rd IEEE Consumer Communications and Networking Conference, CCNC 2006
-
C. Escoffier, D. Donsez, and R.S. Hall Developing an OSGi-like service platform for.NET Proceedings of the 3rd IEEE consumer communications and networking conference (CCNC'06) Vol. 1 January 2006 213 217 URL http://ieeexplore.ieee.org/xpls/abs-all.jsp?arnumber=1593018 (Pubitemid 44460381)
-
(2006)
2006 3rd IEEE Consumer Communications and Networking Conference, CCNC 2006
, vol.1
, pp. 213-217
-
-
Escoffier, C.1
Donsez, D.2
Hall, R.S.3
-
22
-
-
78650778246
-
-
Research Report RR-6801, INRIA
-
N. Geoffray, G. Thomas, G. Muller, P. Parrend, S. Frénot, and B. Folliot I-JVM: A java virtual machine for component isolation in OSGi Research Report RR-6801, INRIA 2009 http://hal.inria.fr/inria-00354580/en/
-
(2009)
I-JVM: A Java Virtual Machine for Component Isolation in OSGi
-
-
Geoffray, N.1
Thomas, G.2
Muller, G.3
Parrend, P.4
Frénot, S.5
Folliot, B.6
-
23
-
-
77952361180
-
VMKit: A substrate for managed runtime environments
-
N. Geoffray, G. Thomas, J. Lawall, G. Muller, and B. Folliot VMKit: a substrate for managed runtime environments Proceedings of the 6th ACM SIGPLAN/SIGOPS international conference on Virtual execution environments (VEE'10) March 2010 51 62
-
(2010)
Proceedings of the 6th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE'10)
, pp. 51-62
-
-
Geoffray, N.1
Thomas, G.2
Lawall, J.3
Muller, G.4
Folliot, B.5
-
26
-
-
33846206119
-
An evaluation of Java application containers according to security requirements
-
DOI 10.1109/WETICE.2005.18, 1566206, Proceedings - Fourteenth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2005
-
A. Herzog, and N. Shahmehri An evaluation of java application containers according to security requirements Proceedings of the 2005 14th IEEE international workshops on enabling technologies: infrastructure for collaborative enterprise (WETICE'05) June 2005 178 183 (Pubitemid 46090871)
-
(2005)
Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE
, vol.2005
, pp. 178-183
-
-
Herzog, A.1
Shahmehri, N.2
-
32
-
-
33749072994
-
Scaling J2EE application servers with the multi-tasking virtual machine
-
M. Jordan, L. Dayns, M. Jarzab, C. Bryce, and G. Czajkowski Scaling J2EE application servers with the multi-tasking virtual machine June 2004 Tech. Rep. TR-2004-135, SUN Microsystems
-
(2004)
Tech. Rep. TR-2004-135, SUN Microsystems
-
-
Jordan, M.1
Dayns, L.2
Jarzab, M.3
Bryce, C.4
Czajkowski, G.5
-
36
-
-
84855985345
-
-
JSR244 5th ed. (Java EE specification). Available Online
-
JSR244 Java specification request 244: java platform, enterprise 5th ed. May 2006 (Java EE specification). Available Online: http://jcp.org/en/jsr/ detail?id=244
-
(2006)
Java Specification Request 244: Java Platform, Enterprise
-
-
-
38
-
-
1842638523
-
Java-MaC: A run-time assurance approach for java programs
-
M. Kim, M. Viswanathan, S. Kannan, I. Lee, and O. Sokolsky Java-MaC: a run-time assurance approach for java programs Formal Methods in System Design October 2004 129 155
-
(2004)
Formal Methods in System Design
, pp. 129-155
-
-
Kim, M.1
Viswanathan, M.2
Kannan, S.3
Lee, I.4
Sokolsky, O.5
-
41
-
-
59849089966
-
Is cloud computing really ready for prime time?
-
N. Leavitt Is cloud computing really ready for prime time? Computer 42 January 2009 15 20
-
(2009)
Computer
, vol.42
, pp. 15-20
-
-
Leavitt, N.1
-
46
-
-
65349177152
-
Security benchmarks of OSGi platforms: Toward hardened OSGi
-
P. Parrend, and S. Frenot Security benchmarks of OSGi platforms: toward hardened OSGi Software- Practice & Experience 39 April 2009 471 499
-
(2009)
Software- Practice & Experience
, vol.39
, pp. 471-499
-
-
Parrend, P.1
Frenot, S.2
-
50
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds Proceedings of the 16th ACM conference on computer and communications security (CCS'09) November 2009 199 212
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS'09)
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
53
-
-
34248378734
-
Sizing multi-space in heap for application isolation
-
DOI 10.1145/1176617.1176654, 1176654, Companion to the 21st ACM SIGPLAN Conference on Object-oriented Programming Systems, Languages, and Applications, OOPSLA 2006
-
K. Sun, Y. Li, M. Hogstrom, and Y. Chen Sizing multi-space in heap for application isolation Proceedings of the 2006 21st ACM SIGPLAN symposium on object-oriented programming systems, languages, and applications (OOPSLA'06) October 2006 647 648 (Pubitemid 46729336)
-
(2006)
Proceedings of the Conference on Object-Oriented Programming Systems, Languages, and Applications, OOPSLA
, vol.2006
, pp. 647-648
-
-
Sun, K.1
Li, Y.2
Hogstrom, M.3
Chen, Y.4
-
54
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
H. Takabi, J.B.D. Joshi, and G.-J. Ahn Security and privacy challenges in cloud computing environments IEEE Security and Privacy 8 December 2010 24 31
-
(2010)
IEEE Security and Privacy
, vol.8
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.-J.3
-
55
-
-
84855984005
-
October Clash of the clouds
-
Online version available. URL
-
The Economist, and October Clash of the clouds The Economist 2009 Online version available. URL: http://www.economist.com/displaystory.cfm?story-id= 14637206
-
(2009)
The Economist
-
-
Economist, T.1
-
57
-
-
68649100902
-
A break in the clouds: Towards a cloud definition
-
L. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner A break in the clouds: towards a cloud definition ACM Computer Communication Review 39 1 2009 50 55
-
(2009)
ACM Computer Communication Review
, vol.39
, Issue.1
, pp. 50-55
-
-
Vaquero, L.1
Rodero-Merino, L.2
Caceres, J.3
Lindner, M.4
-
58
-
-
84906567769
-
Aneka: A software platform for.NET-based cloud computing
-
IOS Press
-
C. Vecchiola, X. Chu, and R. Buyya Aneka: a software platform for.NET-based cloud computing Advances in parallel computing Vol. 18 January 2010 IOS Press 267 298
-
(2010)
Advances in Parallel Computing
, vol.18
, pp. 267-298
-
-
Vecchiola, C.1
Chu, X.2
Buyya, R.3
-
59
-
-
69349098776
-
Cloud computing and the common man
-
J. Viega Cloud computing and the common man Computer Aug 2009 106 108
-
(2009)
Computer
, pp. 106-108
-
-
Viega, J.1
-
60
-
-
0346609657
-
Applying Aspect-Oriented Programming to Security
-
J. Viega, J. Bloch, and P. Chandra Applying aspect-oriented programming to security Cutter IT 14 February 2001 31 39 (Pubitemid 33683812)
-
(2001)
Cutter IT Journal
, vol.14
, Issue.2
, pp. 31-39
-
-
Viega, J.1
Bloch, J.T.2
Chandra, P.3
-
62
-
-
60849109638
-
Applying aspect-orientation in designing security systems: A case study
-
S.G. Yi, Y. Deng, H. Yu, X. He, K. Beznosov, and K. Cooper Applying aspect-orientation in designing security systems: a case study Proceedings of the 16th international conference of software engineering and knowledge engineering (SEKE'04) June 2004 360 365
-
(2004)
Proceedings of the 16th International Conference of Software Engineering and Knowledge Engineering (SEKE'04)
, pp. 360-365
-
-
Yi, S.G.1
Deng, Y.2
Yu, H.3
He, X.4
Beznosov, K.5
Cooper, K.6
|