-
1
-
-
79952917659
-
Reservoir - When one cloud is not enough
-
B. Rochwerger, D. Breitgand, A. Epstein, D. Hadas, I. Loy, K. Nagin, J. Tordsson, C. Ragusa, M. Villari, S. Clayman, E. Levy, A. Maraschini, P. Massonet, H. Munoz, and G. Toffetti, "Reservoir - when one cloud is not enough," Computer, vol. 44, pp. 44-51, 2011.
-
(2011)
Computer
, vol.44
, pp. 44-51
-
-
Rochwerger, B.1
Breitgand, D.2
Epstein, A.3
Hadas, D.4
Loy, I.5
Nagin, K.6
Tordsson, J.7
Ragusa, C.8
Villari, M.9
Clayman, S.10
Levy, E.11
Maraschini, A.12
Massonet, P.13
Munoz, H.14
Toffetti, G.15
-
2
-
-
77957951132
-
How to enhance cloud architectures to enable cross-federation
-
IEEE, July
-
A. Celesti, F. Tusa, M. Villari, and A. Puliafito, "How to enhance cloud architectures to enable cross-federation," in Proceedings of IEEE CLOUD '10, pp. 337-345, IEEE, July 2010.
-
(2010)
Proceedings of IEEE CLOUD '10
, pp. 337-345
-
-
Celesti, A.1
Tusa, F.2
Villari, M.3
Puliafito, A.4
-
6
-
-
70449632948
-
A trusted platform module based anti-forensics system
-
june
-
W. Goh, P. C. Leong, and C. K. Yeo, "A trusted platform module based anti-forensics system," in Network and Service Security, 2009. N2S '09. International Conference on, pp. 1-5, june 2009.
-
(2009)
Network and Service Security, 2009. N2S '09. International Conference on
, pp. 1-5
-
-
Goh, W.1
Leong, P.C.2
Yeo, C.K.3
-
11
-
-
77957263904
-
The security of cloud computing system enabled by trusted computing technology
-
july
-
Z. Shen and Q. Tong, "The security of cloud computing system enabled by trusted computing technology," in Signal Processing Systems (ICSPS), 2010 2nd International Conference on, vol. 2, pp. V2-11 -V2-15, july 2010.
-
(2010)
Signal Processing Systems (ICSPS), 2010 2nd International Conference on
, vol.2
-
-
Shen, Z.1
Tong, Q.2
-
12
-
-
77955797759
-
Cloud computing system based on trusted computing platform
-
may
-
Z. Shen, L. Li, F. Yan, and X. Wu, "Cloud computing system based on trusted computing platform," in Intelligent Computation Technology and Automation (ICICTA), 2010 International Conference on, vol. 1, pp. 942-945, may 2010.
-
(2010)
Intelligent Computation Technology and Automation (ICICTA), 2010 International Conference on
, vol.1
, pp. 942-945
-
-
Shen, Z.1
Li, L.2
Yan, F.3
Wu, X.4
-
13
-
-
78149310420
-
A trusted computing environment model in cloud architecture
-
july
-
X.-Y. Li, L.-T. Zhou, Y. Shi, and Y. Guo, "A trusted computing environment model in cloud architecture," in Machine Learning and Cybernetics (ICMLC), 2010 International Conference on, vol. 6, pp. 2843-2848, july 2010.
-
(2010)
Machine Learning and Cybernetics (ICMLC), 2010 International Conference on
, vol.6
, pp. 2843-2848
-
-
Li, X.-Y.1
Zhou, L.-T.2
Shi, Y.3
Guo, Y.4
-
14
-
-
58049137106
-
Palm: Security preserving vm live migration for systems with vmm-enforced protection
-
oct.
-
F. Zhang, Y. Huang, H. Wang, H. Chen, and B. Zang, "Palm: Security preserving vm live migration for systems with vmm-enforced protection,"in Trusted Infrastructure Technologies Conference, 2008. APTC '08. Third Asia-Pacific, pp. 9-18, oct. 2008.
-
(2008)
Trusted Infrastructure Technologies Conference, 2008. APTC '08. Third Asia-Pacific
, pp. 9-18
-
-
Zhang, F.1
Huang, Y.2
Wang, H.3
Chen, H.4
Zang, B.5
-
15
-
-
79960762481
-
Trusted platform module as an enabler for security in cloud computing
-
may
-
M. Achemlal, S. Gharout, and C. Gaber, "Trusted platform module as an enabler for security in cloud computing," in Network and Information Systems Security (SAR-SSI), 2011 Conference on, pp. 1-6, may 2011.
-
(2011)
Network and Information Systems Security (SAR-SSI), 2011 Conference on
, pp. 1-6
-
-
Achemlal, M.1
Gharout, S.2
Gaber, C.3
-
16
-
-
78149334865
-
The out-of-band virtualization model of network storage based on trusted computing
-
aug.
-
Z. Qiang, C. Dong, W. Yunlong, and D. Zhuang, "The out-of-band virtualization model of network storage based on trusted computing,"in Natural Computation (ICNC), 2010 Sixth International Conference on, vol. 8, pp. 4354-4357, aug. 2010.
-
(2010)
Natural Computation (ICNC), 2010 Sixth International Conference on
, vol.8
, pp. 4354-4357
-
-
Qiang, Z.1
Dong, C.2
Yunlong, W.3
Zhuang, D.4
-
17
-
-
77954488973
-
Research on the security of storage virtualization based on trusted computing
-
may
-
Z. Qiang, W. Yunlong, C. Dong, and D. Zhuang, "Research on the security of storage virtualization based on trusted computing," in Networking and Digital Society (ICNDS), 2010 2nd International Conference on, vol. 2, pp. 237-240, may 2010.
-
(2010)
Networking and Digital Society (ICNDS), 2010 2nd International Conference on
, vol.2
, pp. 237-240
-
-
Qiang, Z.1
Yunlong, W.2
Dong, C.3
Zhuang, D.4
-
20
-
-
84856335430
-
-
Trusted Computing Group (TCG): http://www.trustedcomputinggroup.org/.
-
-
-
-
22
-
-
77954902003
-
Applying software engineering principles for designing cloud@home
-
V. Cunsolo, S. Distefano, A. Puliafito, and M. Scarpa, "Applying software engineering principles for designing cloud@home," in CCGRID, pp. 618-624, 2010.
-
(2010)
CCGRID
, pp. 618-624
-
-
Cunsolo, V.1
Distefano, S.2
Puliafito, A.3
Scarpa, M.4
-
23
-
-
80052765848
-
How clever-based clouds conceive horizontal and vertical federations
-
F. Tusa, A. Celesti, M. Paone, M. Villari, and A. Puliafito, "How clever-based clouds conceive horizontal and vertical federations," in ISCC, pp. 167-172, 2011.
-
(2011)
ISCC
, pp. 167-172
-
-
Tusa, F.1
Celesti, A.2
Paone, M.3
Villari, M.4
Puliafito, A.5
-
24
-
-
79952915899
-
Opennebula: A cloud management tool
-
D. S. Milojicic, I. M. Llorente, and R. S. Montero, "Opennebula: A cloud management tool," IEEE Internet Computing, vol. 15, no. 2, pp. 11-14, 2011.
-
(2011)
IEEE Internet Computing
, vol.15
, Issue.2
, pp. 11-14
-
-
Milojicic, D.S.1
Llorente, I.M.2
Montero, R.S.3
-
25
-
-
74749092816
-
Seamless virtual machine live migration on network security enhanced hypervisor
-
oct.
-
C. Xianqin, W. Han, W. Sumei, and L. Xiang, "Seamless virtual machine live migration on network security enhanced hypervisor," in ICBNMT '09. 2nd IEEE International Conference on Broadband Network Multimedia Technology, pp. 847-853, oct. 2009.
-
(2009)
ICBNMT '09. 2nd IEEE International Conference on Broadband Network Multimedia Technology
, pp. 847-853
-
-
Xianqin, C.1
Han, W.2
Sumei, W.3
Xiang, L.4
-
26
-
-
80052251157
-
Security in virtual machine live migration for kvm
-
july
-
L. YamunaDevi, P. Aruna, D. Sudha Devi, and N. Priya, "Security in virtual machine live migration for kvm," in International Conference on Process Automation, Control and Computing (PACC), pp. 1-6, july 2011.
-
(2011)
International Conference on Process Automation, Control and Computing (PACC)
, pp. 1-6
-
-
YamunaDevi, L.1
Aruna, P.2
Sudha Devi, D.3
Priya, N.4
-
27
-
-
77958069314
-
Secured and reliable vm migration in personal cloud
-
april
-
W. Wang, Y. Zhang, B. Lin, X. Wu, and K. Miao, "Secured and reliable vm migration in personal cloud," in 2nd International Conference on Computer Engineering and Technology (ICCET), vol. 1, pp. V1-705 -V1-709, april 2010.
-
(2010)
2nd International Conference on Computer Engineering and Technology (ICCET)
, vol.1
-
-
Wang, W.1
Zhang, Y.2
Lin, B.3
Wu, X.4
Miao, K.5
-
28
-
-
70349456218
-
Virtual infrastructure management in private and hybrid clouds
-
B. Sotomayor, R. S. Montero, I. M. Llorente, and I. Foster, "Virtual infrastructure management in private and hybrid clouds," IEEE Internet Computing, vol. 13, pp. 14-22, 2009.
-
(2009)
IEEE Internet Computing
, vol.13
, pp. 14-22
-
-
Sotomayor, B.1
Montero, R.S.2
Llorente, I.M.3
Foster, I.4
-
30
-
-
79960762481
-
Trusted platform module as an enabler for security in cloud computing
-
M. Achemlal, S. Gharout, and C. Gaber, "Trusted platform module as an enabler for security in cloud computing," in Network and Information Systems Security Conference, pp. 1-6, 2011.
-
(2011)
Network and Information Systems Security Conference
, pp. 1-6
-
-
Achemlal, M.1
Gharout, S.2
Gaber, C.3
-
31
-
-
84910156435
-
Vtpm: Virtualizing the trusted platform module
-
S. Berger, R. Caceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn, "vtpm: virtualizing the trusted platform module," in Proceedings of the 15th conference on USENIX Security Symposium, vol. 15, pp. 1-6, 2006.
-
(2006)
Proceedings of the 15th Conference on USENIX Security Symposium
, vol.15
, pp. 1-6
-
-
Berger, S.1
Caceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
32
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, "Terra: a virtual machine-based platform for trusted computing," in Proceedings of SOSP, pp. 193-206, 2003.
-
(2003)
Proceedings of SOSP
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
|