-
1
-
-
84863958066
-
-
Amazon web services, http://aws.amazon.com
-
-
-
-
2
-
-
84863958064
-
-
MEXT, Institute of Mathematics for Industry, Kyushu University, Japan
-
Workshop on Secret Sharing and Cloud Computing. MEXT, Institute of Mathematics for Industry, Kyushu University, Japan (2011)
-
(2011)
Workshop on Secret Sharing and Cloud Computing
-
-
-
3
-
-
68249129760
-
-
Tech. Rep. UCB/EECS-2009-28, EECS Department, University of California, Berkeley February
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing. Tech. Rep. UCB/EECS-2009-28, EECS Department, University of California, Berkeley (February 2009)
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
4
-
-
84855701474
-
Enabling secure vm-vtpm migration in private clouds
-
ACM, New York
-
Danev, B., Masti, R.J., Karame, G.O., Capkun, S.: Enabling secure vm-vtpm migration in private clouds. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011, pp. 187-196. ACM, New York (2011)
-
(2011)
Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011
, pp. 187-196
-
-
Danev, B.1
Masti, R.J.2
Karame, G.O.3
Capkun, S.4
-
5
-
-
84863913702
-
Effectiveness of moving target defenses
-
Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Wang, X.S. (eds.) Springer, Heidelberg
-
Evans, D., Nguyen-Tuong, A., Knight, J.: Effectiveness of moving target defenses. In: Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Wang, X.S. (eds.) Moving Target Defense. Advances in Information Security, vol. 54, pp. 29-48. Springer, Heidelberg (2011)
-
(2011)
Moving Target Defense. Advances in Information Security
, vol.54
, pp. 29-48
-
-
Evans, D.1
Nguyen-Tuong, A.2
Knight, J.3
-
6
-
-
84863914729
-
Configuration management security in data center environments
-
Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Wang, X.S. (eds.) Springer, Heidelberg
-
Kant, K.: Configuration management security in data center environments. In: Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Wang, X.S. (eds.) Moving Target Defense. Advances in Information Security, vol. 54, pp. 161-181. Springer, Heidelberg (2011)
-
(2011)
Moving Target Defense. Advances in Information Security
, vol.54
, pp. 161-181
-
-
Kant, K.1
-
7
-
-
77954969841
-
Nohype: Virtualized cloud infrastructure without the virtualization
-
Keller, E., Szefer, J., Rexford, J., Lee, R.B.: Nohype: virtualized cloud infrastructure without the virtualization. SIGARCH Comput. Archit. News 38, 350-361 (2010)
-
(2010)
SIGARCH Comput. Archit. News
, vol.38
, pp. 350-361
-
-
Keller, E.1
Szefer, J.2
Rexford, J.3
Lee, R.B.4
-
8
-
-
79960495659
-
Performance and energy modeling for live migration of virtual machines
-
ACM, New York
-
Liu, H., Xu, C.-Z., Jin, H., Gong, J., Liao, X.: Performance and energy modeling for live migration of virtual machines. In: Proceedings of the 20th International Symposium on High Performance Distributed Computing, HPDC 2011, pp. 171-182. ACM, New York (2011)
-
(2011)
Proceedings of the 20th International Symposium on High Performance Distributed Computing, HPDC 2011
, pp. 171-182
-
-
Liu, H.1
Xu, C.-Z.2
Jin, H.3
Gong, J.4
Liao, X.5
-
9
-
-
70350752495
-
-
Cambridge University Press
-
Nisan, N., Roughgarden, T., Tardos, E., Vazirani, V.: Introduction to Mechanism Design (for Computer Scientists). Cambridge University Press (2007)
-
(2007)
Introduction to Mechanism Design (For Computer Scientists)
-
-
Nisan, N.1
Roughgarden, T.2
Tardos, E.3
Vazirani, V.4
-
10
-
-
1942441379
-
Defending against cache-based side-channel attacks
-
Page, D.: Defending against cache-based side-channel attacks. Information Security Technical Report 8(1), 30-44 (2003)
-
(2003)
Information Security Technical Report
, vol.8
, Issue.1
, pp. 30-44
-
-
Page, D.1
-
11
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM, New York
-
Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 199-212. ACM, New York (2009)
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
12
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Commun. ACM 22, 612-613 (1979)
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
13
-
-
35348816106
-
New cache designs for thwarting software cache-based side channel attacks
-
Wang, Z., Lee, R.B.: New cache designs for thwarting software cache-based side channel attacks. SIGARCH Comput. Archit. News 35, 494-505 (2007)
-
(2007)
SIGARCH Comput. Archit. News
, vol.35
, pp. 494-505
-
-
Wang, Z.1
Lee, R.B.2
|