-
1
-
-
80755169488
-
Sice: A hardware-level strongly isolated computing environment for x86 multi-core platforms
-
New York, NY, USA, ACM
-
Ahmed M. Azab, Peng Ning, and Xiaolan Zhang. Sice: a hardware-level strongly isolated computing environment for x86 multi-core platforms. In Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pages 375-388, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11
, pp. 375-388
-
-
Azab, A.M.1
Ning, P.2
Zhang, X.3
-
2
-
-
84867031658
-
Piga-virt: An advanced distributed macprotection of virtual systems
-
J. Briffaut, E. Lefebvre, J. Rouzaud-Cornabas, and C. Toinard. Piga-virt: an advanced distributed macprotection of virtual systems. In VHPC 2011: 6th Workshop on Virtualization and High-Performance Cloud Computing, Bordeaux, France, 2011.
-
VHPC 2011: 6th Workshop on Virtualization and High-Performance Cloud Computing, Bordeaux, France, 2011
-
-
Briffaut, J.1
Lefebvre, E.2
Rouzaud-Cornabas, J.3
Toinard, C.4
-
3
-
-
0016984825
-
Protection in operating systems
-
August
-
Michael A. Harrison,Walter L. Ruzzo, and Jeffrey D. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461-471, August 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
4
-
-
77954942438
-
An architecture for enforcing end-to-end access control over web applications
-
New York, NY, USA, ACM
-
Boniface Hicks, Sandra Rueda, Dave King, Thomas Moyer, Joshua Schiffman, Yogesh Sreenivasan, Patrick McDaniel, and Trent Jaeger. An architecture for enforcing end-to-end access control over web applications. In Proceedings of the 15th ACM symposium on Access control models and technologies, SACMAT '10, pages 163-172, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, SACMAT '10
, pp. 163-172
-
-
Hicks, B.1
Rueda, S.2
King, D.3
Moyer, T.4
Schiffman, J.5
Sreenivasan, Y.6
McDaniel, P.7
Jaeger, T.8
-
5
-
-
77249130262
-
Outlook: Cloudy with a Chance of Security Challenges and Improvements
-
January
-
Trent Jaeger and Joshua Schiffman. Outlook: Cloudy with a Chance of Security Challenges and Improvements. IEEE Security & Privacy Magazine, 8(1):77-80, January 2010.
-
(2010)
IEEE Security & Privacy Magazine
, vol.8
, Issue.1
, pp. 77-80
-
-
Jaeger, T.1
Schiffman, J.2
-
6
-
-
2442425355
-
Integrating flexible support for security policies into the linux operating system
-
USENIX Association
-
Peter Loscocco and Stephen Smalley. Integrating flexible support for security policies into the linux operating system. In 2001 USENIX Annual Technical Conference (FREENIX '01), Boston, Massachusets, United-States, 2001. USENIX Association.
-
2001 USENIX Annual Technical Conference (FREENIX '01), Boston, Massachusets, United-States, 2001
-
-
Loscocco, P.1
Smalley, S.2
-
7
-
-
38349041413
-
A layered approach to simplified access control in virtualized systems
-
July
-
Bryan D. Payne, Reiner Sailer, Ramón Cáceres, Ron Perez, and Wenke Lee. A layered approach to simplified access control in virtualized systems. SIGOPS Oper. Syst. Rev., 41:12-19, July 2007.
-
(2007)
SIGOPS Oper. Syst. Rev.
, vol.41
, pp. 12-19
-
-
Payne, B.D.1
Sailer, R.2
Cáceres, R.3
Perez, R.4
Lee, W.5
-
8
-
-
79952367895
-
Privacy, security and trust issues arising from cloud computing
-
Washington, DC, USA, IEEE Computer Society
-
Siani Pearson and Azzedine Benameur. Privacy, security and trust issues arising from cloud computing. In Proceedings of the 2010 IEEE Second International Conference on Cloud Computing Technology and Science, CLOUDCOM '10, pages 693-702, Washington, DC, USA, 2010. IEEE Computer Society.
-
(2010)
Proceedings of the 2010 IEEE Second International Conference on Cloud Computing Technology and Science, CLOUDCOM '10
, pp. 693-702
-
-
Pearson, S.1
Benameur, A.2
-
9
-
-
70450278760
-
Analysis of virtual machine system policies
-
New York, NY, USA, ACM
-
Sandra Rueda, Hayawardh Vijayakumar, and Trent Jaeger. Analysis of virtual machine system policies. In Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pages 227-236, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, SACMAT '09
, pp. 227-236
-
-
Rueda, S.1
Vijayakumar, H.2
Jaeger, T.3
-
10
-
-
78650161685
-
Towards a discipline of mission-aware cloud computing
-
New York, NY, USA, ACM
-
Ravi Sandhu, Raj Boppana, Ram Krishnan, Jeff Reich, Todd Wolff, and Josh Zachry. Towards a discipline of mission-aware cloud computing. In Proceedings of the 2010 ACM workshop on Cloud computing security workshop, CCSW '10, pages 13-18, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW '10
, pp. 13-18
-
-
Sandhu, R.1
Boppana, R.2
Krishnan, R.3
Reich, J.4
Wolff, T.5
Zachry, J.6
-
11
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
nov.-dec.
-
H. Takabi, J.B.D. Joshi, and G. Ahn. Security and privacy challenges in cloud computing environments. Security Privacy, IEEE, 8(6):24-31, nov.-dec. 2010.
-
(2010)
Security Privacy, IEEE
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.3
-
12
-
-
79751493181
-
Locking the sky: A survey on iaas cloud security
-
January
-
Luis M. Vaquero, Luis Rodero-Merino, and Daniel Morn. Locking the sky: a survey on iaas cloud security. Computing, 91:93-118, January 2011.
-
(2011)
Computing
, vol.91
, pp. 93-118
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Morn, D.3
-
13
-
-
82655179240
-
Cloudvisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
-
New York, NY, USA, ACM
-
Fengzhe Zhang, Jin Chen, Haibo Chen, and Binyu Zang. Cloudvisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, pages 203-216, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11
, pp. 203-216
-
-
Zhang, F.1
Chen, J.2
Chen, H.3
Zang, B.4
|