-
1
-
-
84929445167
-
Towards trusted cloud computing
-
Proceedings of the 2009 conference on Hot topics in cloud computing, ser. Berkeley, CA, USA: USENIX Association, [Online]. Available
-
N. Santos, K. P. Gummadi, and R. Rodrigues, "Towards trusted cloud computing," in Proceedings of the 2009 conference on Hot topics in cloud computing, ser. HotCloud'09. Berkeley, CA, USA: USENIX Association, 2009. [Online]. Available: http://dl.acm.org/citation.cfm?id=1855533.1855536
-
(2009)
HotCloud'09
-
-
Santos, N.1
Gummadi, K.P.2
Rodrigues, R.3
-
2
-
-
84864878200
-
Securely launching virtual machines on trustworthy plat-forms in a public cloud
-
SciTePress
-
M. Aslam, C. Gehrmann, L. Rasmusson, and M. Björkman, "Securely launching virtual machines on trustworthy plat-forms in a public cloud," in CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18-21 April, 2012. SciTePress, 2012.
-
(2012)
CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18-21 April, 2012
-
-
Aslam, M.1
Gehrmann, C.2
Rasmusson, L.3
Björkman, M.4
-
3
-
-
78650083239
-
Seeding clouds with trust anchors
-
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, ser. New York, NY, USA: ACM, [Online]. Available
-
J. Schiffman, T. Moyer, H. Vijayakumar, T. Jaeger, and P. McDaniel, "Seeding clouds with trust anchors," in Proceedings of the 2010 ACM workshop on Cloud computing security workshop, ser. CCSW '10. New York, NY, USA: ACM, 2010, pp. 43-46. [Online]. Available: http://doi.acm.org/10.1145/1866835. 1866843
-
(2010)
CCSW '10
, pp. 43-46
-
-
Schiffman, J.1
Moyer, T.2
Vijayakumar, H.3
Jaeger, T.4
McDaniel, P.5
-
7
-
-
84889939067
-
-
"VMware Inc., Virtualization Solutions," http://www.vmware.com/ virtualization/, 2011.
-
(2011)
Virtualization Solutions
-
-
-
8
-
-
84856349450
-
A remote attestation approach for a secure virtual machine migration in federated cloud environments
-
IEEE
-
A. Celesti, A. Salici, M. Villari, and A. Puliafito, "A remote attestation approach for a secure virtual machine migration in federated cloud environments," in 2011 First International Symposium on Network Cloud Computing and Applications. IEEE, 2011, pp. 99-106.
-
(2011)
2011 First International Symposium on Network Cloud Computing and Applications
, pp. 99-106
-
-
Celesti, A.1
Salici, A.2
Villari, M.3
Puliafito, A.4
-
9
-
-
77952661953
-
Internet suspend/resume
-
Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications, ser. Washington, DC, USA: IEEE Computer Society, [Online]. Available
-
M. Kozuch and M. Satyanarayanan, "Internet suspend/resume," in Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications, ser. WMCSA '02. Washington, DC, USA: IEEE Computer Society, 2002, pp. 40-. [Online]. Available: http://dl.acm.org/citation.cfm?id=832315.837557
-
(2002)
WMCSA '02
, pp. 40
-
-
Kozuch, M.1
Satyanarayanan, M.2
-
10
-
-
85059766484
-
Live migration of virtual machines
-
ser. NSDI'05. Berkeley, CA, USA: USENIX Association, [Online]. Available
-
C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A. Warfield, "Live migration of virtual machines," in Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2, ser. NSDI'05. Berkeley, CA, USA: USENIX Association, 2005, pp. 273-286. [Online]. Available: http://dl.acm.org/citation.cfm?id= 1251203.1251223
-
(2005)
Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation
, vol.2
, pp. 273-286
-
-
Clark, C.1
Fraser, K.2
Hand, S.3
Hansen, J.G.4
Jul, E.5
Limpach, C.6
Pratt, I.7
Warfield, A.8
-
11
-
-
84864877472
-
Security Considerations for Virtual Platform Provisioning
-
UK: Academic Publishing Limited, July
-
M. Aslam and C. Gehrmann, "Security Considerations for Virtual Platform Provisioning," in ECIW '11: Proceedings of the 10th European Conference on Information Warfare and Security, The Institute of Cybernetics at the Tallinn University of Technology. UK: Academic Publishing Limited, July 2011, pp. 283-290.
-
(2011)
ECIW '11: Proceedings of the 10th European Conference on Information Warfare and Security, the Institute of Cybernetics at the Tallinn University of Technology
, pp. 283-290
-
-
Aslam, M.1
Gehrmann, C.2
-
12
-
-
78649302229
-
Cloud computing: State-of-the-art and research challenges
-
[Online]. Available
-
Q. Zhang, L. Cheng, and R. Boutaba, "Cloud computing: state-of-the-art and research challenges," Journal of Internet Services and Applications, vol. 1, no. 1, pp. 7-18, 2010. [Online]. Available: http://www.springerlink.com/index/10.1007/s13174-010-0007-6
-
(2010)
Journal of Internet Services and Applications
, vol.1
, Issue.1
, pp. 7-18
-
-
Zhang, Q.1
Cheng, L.2
Boutaba, R.3
-
13
-
-
77958069314
-
Secured and reliable vm migration in personal cloud
-
april
-
W. Wang, Y. Zhang, B. Lin, X. Wu, and K. Miao, "Secured and reliable vm migration in personal cloud," in Computer Engineering and Technology (ICCET), 2010 2nd International Conference on, vol. 1, april 2010, pp. V1-705-V1-709.
-
(2010)
Computer Engineering and Technology (ICCET), 2010 2nd International Conference on
, vol.1
-
-
Wang, W.1
Zhang, Y.2
Lin, B.3
Wu, X.4
Miao, K.5
-
14
-
-
58049137106
-
Palm: Security preserving vm live migration for systems with vmm-enforced protection
-
oct.
-
F. Zhang, Y. Huang, H. Wang, H. Chen, and B. Zang, "Palm: Security preserving vm live migration for systems with vmm-enforced protection," in Trusted Infrastructure Technologies Conference, 2008. APTC '08. Third Asia-Pacific, oct. 2008, pp. 9-18.
-
(2008)
Trusted Infrastructure Technologies Conference, 2008. APTC '08. Third Asia-Pacific
, pp. 9-18
-
-
Zhang, F.1
Huang, Y.2
Wang, H.3
Chen, H.4
Zang, B.5
-
15
-
-
35348963573
-
Daonity - Grid security from two levels of virtualization
-
June [Online]. Available
-
H. Chen, J. Chen, W. Mao, and F. Yan, "Daonity - grid security from two levels of virtualization," Inf. Secur. Tech. Rep., vol. 12, pp. 123-138, June 2007. [Online]. Available: http://dl.acm.org/citation.cfm?id= 1298760.1298887
-
(2007)
Inf. Secur. Tech. Rep.
, vol.12
, pp. 123-138
-
-
Chen, H.1
Chen, J.2
Mao, W.3
Yan, F.4
-
16
-
-
58049139900
-
-
H. Chen, F. Zhang, C. Chen, Z. Yang, R. Chen, B. Zang, W. Mao, H. Chen, F. Zhang, C. Chen, Z. Yang, R. Chen, B. Zang, and W. Mao, "Tamper-resistant execution in an untrusted operating system using a virtual machine monitor," 2007.
-
(2007)
Tamper-resistant Execution in An Untrusted Operating System Using A Virtual Machine Monitor
-
-
Chen, H.1
Zhang, F.2
Chen, C.3
Yang, Z.4
Chen, R.5
Zang, B.6
Mao, W.7
Chen, H.8
Zhang, F.9
Chen, C.10
Yang, Z.11
Chen, R.12
Zang, B.13
Mao, W.14
-
17
-
-
84855701474
-
Enabling secure vm-vtpm migration in private clouds
-
Proceedings of the 27th Annual Computer Security Applications Conference, ser. New York, NY, USA: ACM, [Online]. Available
-
B. Danev, R. J. Masti, G. O. Karame, and S. Capkun, "Enabling secure vm-vtpm migration in private clouds," in Proceedings of the 27th Annual Computer Security Applications Conference, ser. ACSAC '11. New York, NY, USA: ACM, 2011, pp. 187-196. [Online]. Available: http://doi.acm.org/10.1145/2076732. 2076759
-
(2011)
ACSAC '11
, pp. 187-196
-
-
Danev, B.1
Masti, R.J.2
Karame, G.O.3
Capkun, S.4
-
18
-
-
84910156435
-
VTPM: Virtualizing the Trusted Platform Module
-
Berkeley, CA, USA: USENIX Association
-
S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn, "vTPM: Virtualizing the Trusted Platform Module," in USENIX-SS'06: Proceedings of the 15th Conference on USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2006.
-
(2006)
USENIX-SS'06: Proceedings of the 15th Conference on USENIX Security Symposium
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
19
-
-
78650314823
-
-
May
-
"TCG credential profiles," http://www.trustedcomputinggroup. org/, May 2007.
-
(2007)
TCG Credential Profiles
-
-
|