메뉴 건너뛰기




Volumn 376 AICT, Issue , 2012, Pages 388-399

Incentive compatible moving target defense against VM-colocation attacks in clouds

Author keywords

Cloud computing; Moving target defence; VCG mechanism; VM migration

Indexed keywords

CLOUD PROVIDERS; COLOCATIONS; COMPUTING INFRASTRUCTURES; HYPERVISOR; INCENTIVE COMPATIBLE; MIGRATION STRATEGY; MOVING TARGETS; PROCESSOR DESIGN; SECURITY LEVEL; SIDE CHANNEL ATTACK; VCG MECHANISM; VIRTUAL MACHINES; VM MIGRATION;

EID: 84863977611     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-30436-1_32     Document Type: Conference Paper
Times cited : (104)

References (13)
  • 1
    • 84863958066 scopus 로고    scopus 로고
    • Amazon web services, http://aws.amazon.com
  • 2
    • 84863958064 scopus 로고    scopus 로고
    • MEXT, Institute of Mathematics for Industry, Kyushu University, Japan
    • Workshop on Secret Sharing and Cloud Computing. MEXT, Institute of Mathematics for Industry, Kyushu University, Japan (2011)
    • (2011) Workshop on Secret Sharing and Cloud Computing
  • 5
    • 84863913702 scopus 로고    scopus 로고
    • Effectiveness of moving target defenses
    • Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Wang, X.S. (eds.) Springer, Heidelberg
    • Evans, D., Nguyen-Tuong, A., Knight, J.: Effectiveness of moving target defenses. In: Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Wang, X.S. (eds.) Moving Target Defense. Advances in Information Security, vol. 54, pp. 29-48. Springer, Heidelberg (2011)
    • (2011) Moving Target Defense. Advances in Information Security , vol.54 , pp. 29-48
    • Evans, D.1    Nguyen-Tuong, A.2    Knight, J.3
  • 6
    • 84863914729 scopus 로고    scopus 로고
    • Configuration management security in data center environments
    • Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Wang, X.S. (eds.) Springer, Heidelberg
    • Kant, K.: Configuration management security in data center environments. In: Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Wang, X.S. (eds.) Moving Target Defense. Advances in Information Security, vol. 54, pp. 161-181. Springer, Heidelberg (2011)
    • (2011) Moving Target Defense. Advances in Information Security , vol.54 , pp. 161-181
    • Kant, K.1
  • 7
    • 77954969841 scopus 로고    scopus 로고
    • Nohype: Virtualized cloud infrastructure without the virtualization
    • Keller, E., Szefer, J., Rexford, J., Lee, R.B.: Nohype: virtualized cloud infrastructure without the virtualization. SIGARCH Comput. Archit. News 38, 350-361 (2010)
    • (2010) SIGARCH Comput. Archit. News , vol.38 , pp. 350-361
    • Keller, E.1    Szefer, J.2    Rexford, J.3    Lee, R.B.4
  • 10
    • 1942441379 scopus 로고    scopus 로고
    • Defending against cache-based side-channel attacks
    • Page, D.: Defending against cache-based side-channel attacks. Information Security Technical Report 8(1), 30-44 (2003)
    • (2003) Information Security Technical Report , vol.8 , Issue.1 , pp. 30-44
    • Page, D.1
  • 12
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A.: How to share a secret. Commun. ACM 22, 612-613 (1979)
    • (1979) Commun. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 13
    • 35348816106 scopus 로고    scopus 로고
    • New cache designs for thwarting software cache-based side channel attacks
    • Wang, Z., Lee, R.B.: New cache designs for thwarting software cache-based side channel attacks. SIGARCH Comput. Archit. News 35, 494-505 (2007)
    • (2007) SIGARCH Comput. Archit. News , vol.35 , pp. 494-505
    • Wang, Z.1    Lee, R.B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.