메뉴 건너뛰기




Volumn , Issue , 2012, Pages 511-521

Securely launching virtual machines on trustworthy platforms in a public cloud: An enterprise's perspective

Author keywords

Cloud computing; IaaS; Security; Trusted computing; Virtualization

Indexed keywords

INFRASTRUCTURE AS A SERVICE (IAAS); NETWORK SECURITY; TRUSTED COMPUTING; VIRTUALIZATION;

EID: 84864878200     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (10)

References (26)
  • 2
    • 84864877472 scopus 로고    scopus 로고
    • Security considerations for virtual platform provisioning
    • UK. The Institute of Cybernetics at the Tallinn University of Technology, Academic Publishing Limited
    • Aslam, M. and Gehrmann, C. (2011). Security Considerations for Virtual Platform Provisioning. In ECIW '11: Proceedings of the 10th European Conference on Information Warfare and Security, pages 283-290, UK. The Institute of Cybernetics at the Tallinn University of Technology, Academic Publishing Limited.
    • (2011) ECIW '11: Proceedings of the 10th European Conference on Information Warfare and Security , pp. 283-290
    • Aslam, M.1    Gehrmann, C.2
  • 6
    • 84864868892 scopus 로고    scopus 로고
    • Cloud Computing and Security
    • Cloud Computing and Security (2010). Cloud Computing and Security - A Natural Match. http://www.trustedcomputinggroup.org/resources/cloud-computing- and-security-a-natural-match.
    • (2010) Cloud Computing and Security - A Natural Match
  • 16
    • 50649096920 scopus 로고    scopus 로고
    • An empirical study into the security exposure to hosts of hostile virtualized environments
    • Ormandy, T. (2007). An empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments. In Can Sec West.
    • (2007) Can Sec West
    • Ormandy, T.1
  • 17
    • 80052161321 scopus 로고    scopus 로고
    • Lucy in the sky without diamonds: Stealing confidential data in the cloud
    • Rocha, F. and Correia, M. (2011). Lucy in the sky without diamonds: Stealing confidential data in the cloud. Dependable Systems and Networks Workshops, 0:129-134.
    • (2011) Dependable Systems and Networks Workshops , vol.0 , pp. 129-134
    • Rocha, F.1    Correia, M.2
  • 18
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a tcg-based integrity measurement architecture
    • SSYM'04 Berkeley, CA, USA. USENIX Association
    • Sailer, R., Zhang, X., Jaeger, T., and van Doorn, L. (2004). Design and implementation of a tcg-based integrity measurement architecture. In Proceedings of the 13th conference on USENIX Security Symposium - Volume 13, SSYM'04, pages 16-16, Berkeley, CA, USA. USENIX Association.
    • (2004) Proceedings of the 13th Conference on USENIX Security Symposium , vol.13 , pp. 16-16
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    Van Doorn, L.4
  • 20
    • 21644486314 scopus 로고    scopus 로고
    • TCG Architecture Overview
    • TCG Architecture Overview (2007). TCG Specification Architecture Overview. http://www.trustedcomputinggroup.org/resources.
    • (2007) TCG Specification Architecture Overview
  • 22
    • 85162505621 scopus 로고    scopus 로고
    • TMI
    • TMI (2010). TCG Trusted Multi-Tenant Infrastructure. http://www. trustedcomputinggroup.org/developers/tr-usted-multitenant-infrastructure.
    • (2010) TCG Trusted Multi-tenant Infrastructure
  • 26
    • 79751493181 scopus 로고    scopus 로고
    • Locking the sky: A survey on iaas cloud security
    • Vaquero, L. M., Rodero-Merino, L., and Morán, D. (2011). Locking the sky: a survey on iaas cloud security. Computing, 91:93-118.
    • (2011) Computing , vol.91 , pp. 93-118
    • Vaquero, L.M.1    Rodero-Merino, L.2    Morán, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.