-
2
-
-
78649245892
-
-
European Network and Information Security Agency, Tech. Rep.
-
European Network and Information Security Agency, "Cloud Computing Security Risk Assessment," Tech. Rep., 11 2009.
-
(2009)
Cloud Computing Security Risk Assessment
, vol.11
-
-
-
3
-
-
79751493181
-
Locking the sky: A survey on iaas cloud security
-
L. Vaquero, L. Rodero-Merino, and D. Morn, "Locking the sky: a survey on iaas cloud security," Computing, vol. 91, pp. 93-118, 2011.
-
(2011)
Computing
, vol.91
, pp. 93-118
-
-
Vaquero, L.1
Rodero-Merino, L.2
Morn, D.3
-
4
-
-
77954327465
-
What's new about cloud computing security?
-
EECS Department
-
Y. Chen, V. Paxson, and R. H. Katz, "What's New About Cloud Computing Security?" EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2010-5, 01 2010.
-
(2010)
University of California, Berkeley, Tech. Rep. UCB/EECS- 2010-5
, vol.1
-
-
Chen, Y.1
Paxson, V.2
Katz, R.H.3
-
5
-
-
78249269487
-
Designing cloud services adhering to government privacy laws
-
F. Dölitzscher, C. Reich, and A. Sulistio, "Designing cloud services adhering to government privacy laws," in Proceedings of 10th IEEE International Conference on Computer and Information Technology (CIT 2010), 2010, pp. 930-935.
-
(2010)
Proceedings of 10th IEEE International Conference on Computer and Information Technology (CIT 2010)
, pp. 930-935
-
-
Dölitzscher, F.1
Reich, C.2
Sulistio, A.3
-
6
-
-
0034300682
-
Intrusion detection using autonomous agents
-
recent Advances in Intrusion Detection Systems
-
E. H. Spafford and D. Zamboni, "Intrusion detection using autonomous agents," Computer Networks, vol. 34, no. 4, pp. 547 - 570, 2000, recent Advances in Intrusion Detection Systems.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 547-570
-
-
Spafford, E.H.1
Zamboni, D.2
-
7
-
-
70349151793
-
Extending virtualization services with trust guarantees via behavioral monitoring
-
New York, NY, USA: ACM
-
H. Raj and K. Schwan, "Extending virtualization services with trust guarantees via behavioral monitoring," in Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems, ser. VDTS '09. New York, NY, USA: ACM, 2009, pp. 24-29.
-
(2009)
Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems, Ser. VDTS '09
, pp. 24-29
-
-
Raj, H.1
Schwan, K.2
-
8
-
-
84955580290
-
An architecture for intrusion detection using autonomous agents
-
dec
-
J. Balasubramaniyan, J. Garcia-Fernandez, D. Isacoff, E. Spafford, and D. Zamboni, "An architecture for intrusion detection using autonomous agents," in Computer Security Applications Conference, 1998, Proceedings., 14th Annual, dec 1998, pp. 13 -24.
-
(1998)
Computer Security Applications Conference, 1998, Proceedings., 14th Annual
, pp. 13-24
-
-
Balasubramaniyan, J.1
Garcia-Fernandez, J.2
Isacoff, D.3
Spafford, E.4
Zamboni, D.5
-
9
-
-
62949125343
-
Design and implementation of intrusion detection based on mobile agents
-
dec
-
Y. Mo, Y. Ma, and L. Xu, "Design and implementation of intrusion detection based on mobile agents," in IT in Medicine and Education, 2008. ITME 2008. IEEE International Symposium on, dec. 2008, pp. 278-281.
-
(2008)
IT in Medicine and Education, 2008. ITME 2008. IEEE International Symposium on
, pp. 278-281
-
-
Mo, Y.1
Ma, Y.2
Xu, L.3
-
10
-
-
71249124937
-
An architecture of a distributed intrusion detection system using cooperating agents
-
june
-
J. Sen, I. Sengupta, and P. Chowdhury, "An architecture of a distributed intrusion detection system using cooperating agents," in Computing Informatics, 2006. ICOCI '06. International Conference on, june 2006, pp. 1-6.
-
(2006)
Computing Informatics, 2006. ICOCI '06. International Conference on
, pp. 1-6
-
-
Sen, J.1
Sengupta, I.2
Chowdhury, P.3
-
11
-
-
74049145625
-
Managing security of virtual machine images in a cloud environment
-
New York, NY, USA: ACM. [Online]
-
J. Wei, X. Zhang, G. Ammons, V. Bala, and P. Ning, "Managing security of virtual machine images in a cloud environment," in Proceedings of the 2009 ACM workshop on Cloud computing security, ser. CCSW '09. New York, NY, USA: ACM, 2009, pp. 91-96. [Online]. Available: http://doi.acm.org/10.1145/ 1655008.1655021
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security, Ser. CCSW '09
, pp. 91-96
-
-
Wei, J.1
Zhang, X.2
Ammons, G.3
Bala, V.4
Ning, P.5
-
13
-
-
79952065844
-
-
[Online]
-
Cloud Security Alliance, "Top Threats to Cloud Computing V1.0," 2010. [Online]. Available: https://cloudsecurityalliance.org/topthreats.html
-
(2010)
Top Threats to Cloud Computing V1.0
-
-
-
15
-
-
0000949239
-
Grids - A graph based intrusion detection system for large networks
-
S. Staniford-chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagl, K. Levitt, C.Wee, R. Yip, and D. Zerkle, "Grids - a graph based intrusion detection system for large networks," in In Proceedings of the 19th National Information Systems Security Conference, 1996, pp. 361-370.
-
(1996)
Proceedings of the 19th National Information Systems Security Conference
, pp. 361-370
-
-
Staniford-Chen, S.1
Cheung, S.2
Crawford, R.3
Dilger, M.4
Frank, J.5
Hoagl, J.6
Levitt, K.7
Wee, C.8
Yip, R.9
Zerkle, D.10
-
16
-
-
78249233138
-
Cloud infrastructure & applications - CloudIA
-
Beijing, China
-
Anthony Sulistio and Christoph Reich and Frank Dlitzscher, "Cloud Infrastructure & Applications - CloudIA," in Proceedings of the 1st International Conference on Cloud Computing (CloudCom'09), Beijing, China, 12 2009.
-
(2009)
Proceedings of the 1st International Conference on Cloud Computing (CloudCom'09)
, pp. 12
-
-
Sulistio, A.1
Reich, C.2
Dlitzscher, F.3
-
18
-
-
59649128238
-
Agent mobility architecture based on IEEE-fipa standards
-
J. Cucurull, R. Mart, G. Navarro-Arribas, S. Robles, B. Overeinder, and J. Borrell, "Agent mobility architecture based on ieee-fipa standards," Computer Communications, vol. 32, no. 4, pp. 712 - 729, 2009.
-
(2009)
Computer Communications
, vol.32
, Issue.4
, pp. 712-729
-
-
Cucurull, J.1
Mart, R.2
Navarro-Arribas, G.3
Robles, S.4
Overeinder, B.5
Borrell, J.6
-
19
-
-
33744503332
-
-
E. Cortese, F. Quarta, G. Vitaglione, T. I. Lab, C. Direzionale, J. Message, and T. System, "Scalability and performance of jade message transport system," 2002.
-
(2002)
Scalability and Performance of Jade Message Transport System
-
-
Cortese, E.1
Quarta, F.2
Vitaglione, G.3
Lab, T.I.4
Direzionale, C.5
Message, J.6
System, T.7
-
20
-
-
56349086256
-
A performance analysis of multi-agent systems
-
[Online]
-
K. Jurasovic, G. Jezic, and M. Kusek, "A performance analysis of multi-agent systems." ITSSA, vol. 1, no. 4, pp. 335-342, 2006. [Online]. Available: http://dblp.uni-trier.de/db/journals/itssa/itssa1.html\#JurasovicJK06
-
(2006)
ITSSA
, vol.1
, Issue.4
, pp. 335-342
-
-
Jurasovic, K.1
Jezic, G.2
Kusek, M.3
|