-
1
-
-
84863347280
-
Size estimation of cloud migration projects with cloud migration point (CMP)
-
Washington, DC, USA: IEEE Computer Society
-
V. T. K. Tran, K. Lee, A. Fekete, A. Liu, and J. Keung, "Size estimation of cloud migration projects with cloud migration point (CMP)," in Proceedings of the 2011 International Symposium on Empirical Software Engineering and Measurement. Washington, DC, USA: IEEE Computer Society, 2011, pp. 265-274.
-
(2011)
Proceedings of the 2011 International Symposium on Empirical Software Engineering and Measurement
, pp. 265-274
-
-
Tran, V.T.K.1
Lee, K.2
Fekete, A.3
Liu, A.4
Keung, J.5
-
3
-
-
84969931080
-
On the impossibility of cryptography alone for privacy-preserving cloud computing
-
Berkeley, CA, USA: USENIX Association
-
M. Van Dijk and A. Juels, "On the impossibility of cryptography alone for privacy-preserving cloud computing," in Proceedings of the 5th USENIX conference on Hot topics in security. Berkeley, CA, USA: USENIX Association, 2010, pp. 1-8.
-
(2010)
Proceedings of the 5th USENIX Conference on Hot Topics in Security
, pp. 1-8
-
-
Van Dijk, M.1
Juels, A.2
-
4
-
-
84858790227
-
Architectural support for secure virtualization under a vulnerable hypervisor
-
Proceedings of the 44th Annual IEEE/ACM International Symposium on Microarchitecture, ser. New York, NY, USA: ACM
-
S. Jin, J. Ahn, S. Cha, and J. Huh, "Architectural support for secure virtualization under a vulnerable hypervisor," in Proceedings of the 44th Annual IEEE/ACM International Symposium on Microarchitecture, ser. MICRO-44 '11. New York, NY, USA: ACM, 2011, pp. 272-283.
-
(2011)
MICRO-44 '11
, pp. 272-283
-
-
Jin, S.1
Ahn, J.2
Cha, S.3
Huh, J.4
-
6
-
-
79960589521
-
A tale of migration to cloud computing for sharing experiences and observations
-
The 2nd International Workshop on Software Engineering for Cloud Computing, ser. New York, NY, USA: ACM
-
M. A. Babar and M. A. Chauhan, "A tale of migration to cloud computing for sharing experiences and observations," in The 2nd International Workshop on Software Engineering for Cloud Computing, ser. SECLOUD '11. New York, NY, USA: ACM, 2011, pp. 50-56.
-
(2011)
SECLOUD '11
, pp. 50-56
-
-
Babar, M.A.1
Chauhan, M.A.2
-
7
-
-
80053398161
-
Software engineering challenges for migration to the service cloud paradigm: Ongoing work in the REMICS project
-
P. Mohagheghi and T. Sæther, "Software engineering challenges for migration to the service cloud paradigm: Ongoing work in the REMICS project," in World Congress on Services (SERVICES), 2011, pp. 507-514.
-
World Congress on Services (SERVICES), 2011
, pp. 507-514
-
-
Mohagheghi, P.1
Sæther, T.2
-
8
-
-
84857166447
-
MyTrustedCloud: Trusted cloud infrastructure for security-critical computation and data managment
-
Los Alamitos, CA, USA: IEEE Computer Society
-
D. Wallom, M. Turilli, A. Martin, A. Raun, G. Taylor, N. Hargreaves, and A. McMoran, "myTrustedCloud: Trusted cloud infrastructure for security-critical computation and data managment," in IEEE International Conference on Cloud Computing Technology and Science. Los Alamitos, CA, USA: IEEE Computer Society, 2011, pp. 247-254.
-
(2011)
IEEE International Conference on Cloud Computing Technology and Science
, pp. 247-254
-
-
Wallom, D.1
Turilli, M.2
Martin, A.3
Raun, A.4
Taylor, G.5
Hargreaves, N.6
McMoran, A.7
-
9
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, "Terra: a virtual machine-based platform for trusted computing," SIGOPS Oper. Syst. Rev., vol. 37, no. 5, pp. 193-206, 2003.
-
(2003)
SIGOPS Oper. Syst. Rev.
, vol.37
, Issue.5
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
10
-
-
84864866703
-
Protecting private data in the cloud
-
April
-
L. Rasmusson and M. Aslam, "Protecting private data in the cloud," in 2nd International Conference on Cloud Computing and Services Science (CLOSER), Porto, Portugal, 2012, pp. 18-21 April.
-
2nd International Conference on Cloud Computing and Services Science (CLOSER), Porto, Portugal, 2012
, pp. 18-21
-
-
Rasmusson, L.1
Aslam, M.2
-
11
-
-
84872077252
-
Unshackle the cloud!
-
D. Williams, E. Elnikety, M. Eldehiry, H. Jamjoom, H. Huang, and H. Weatherspoon, "Unshackle the cloud!" in 3rd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud)s, Portland, OR, June 2011.
-
3rd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud)s, Portland, OR, June 2011
-
-
Williams, D.1
Elnikety, E.2
Eldehiry, M.3
Jamjoom, H.4
Huang, H.5
Weatherspoon, H.6
-
12
-
-
84863164521
-
Nestcloud: Towards practical nested virtualization
-
Z. Pan, Q. He, W. Jiang, Y. Chen, and Y. Dong, "Nestcloud: Towards practical nested virtualization," in Proc. Int Cloud and Service Computing (CSC) Conf, 2011, pp. 321-329.
-
Proc. Int Cloud and Service Computing (CSC) Conf, 2011
, pp. 321-329
-
-
Pan, Z.1
He, Q.2
Jiang, W.3
Chen, Y.4
Dong, Y.5
-
13
-
-
82655178636
-
The turtles project: Design and implementation of nested virtualization
-
Berkeley, CA, USA: USENIX Association
-
M. Ben-Yehuda, M. D. Day, Z. Dubitzky, M. Factor, N. Har'El, A. Gordon, A. Liguori, O. Wasserman, and B.-A. Yassour, "The turtles project: design and implementation of nested virtualization," in The 9th USENIX conference on Operating systems design and implementation. Berkeley, CA, USA: USENIX Association, 2010, pp. 1-6.
-
(2010)
The 9th USENIX Conference on Operating Systems Design and Implementation
, pp. 1-6
-
-
Ben-Yehuda, M.1
Day, M.D.2
Dubitzky, Z.3
Factor, M.4
Har'El, N.5
Gordon, A.6
Liguori, A.7
Wasserman, O.8
Yassour, B.-A.9
-
14
-
-
82655179240
-
Cloudvisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
-
New York, NY, USA: ACM
-
F. Zhang, J. Chen, H. Chen, and B. Zang, "Cloudvisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization," in Twenty-Third ACM Symposium on Operating Systems Principles. New York, NY, USA: ACM, 2011, pp. 203-216.
-
(2011)
Twenty-Third ACM Symposium on Operating Systems Principles
, pp. 203-216
-
-
Zhang, F.1
Chen, J.2
Chen, H.3
Zang, B.4
-
15
-
-
80052162673
-
Recursive virtual machines for advanced security mechanisms
-
Washington, DC, USA: IEEE Computer Society
-
B. Kauer, P. Verissimo, and A. Bessani, "Recursive virtual machines for advanced security mechanisms," in 41st International Conference on Dependable Systems and Networks Workshops. Washington, DC, USA: IEEE Computer Society, 2011, pp. 117-122.
-
(2011)
41st International Conference on Dependable Systems and Networks Workshops
, pp. 117-122
-
-
Kauer, B.1
Verissimo, P.2
Bessani, A.3
-
16
-
-
84872070800
-
The Xen-Blanket: Virtualize once, run everywhere
-
D. Williams, H. Jamjoom, and H. Weatherspoon, "The Xen-Blanket: Virtualize once, run everywhere," in 7th ACM European Conference on Computer Systems (Eurosys), Bern, Switzerland, April 2012.
-
7th ACM European Conference on Computer Systems (Eurosys), Bern, Switzerland, April 2012
-
-
Williams, D.1
Jamjoom, H.2
Weatherspoon, H.3
-
17
-
-
84866762052
-
Introducing STRATOS: A cloud broker service
-
P. Pawluk, B. Simmons, M. Smit, M. Litoiu, and S. Mankovski, "Introducing STRATOS: A cloud broker service," in 2012 IEEE 5th International Conference on Cloud Computing (CLOUD), 2012, pp. 891-898.
-
2012 IEEE 5th International Conference on Cloud Computing (CLOUD), 2012
, pp. 891-898
-
-
Pawluk, P.1
Simmons, B.2
Smit, M.3
Litoiu, M.4
Mankovski, S.5
-
18
-
-
84867244324
-
A web service for cloud metadata
-
Los Alamitos, CA, USA: IEEE Computer Society
-
M. Smit, P. Pawluk, B. Simmons, and M. Litoiu, "A web service for cloud metadata," in IEEE Congress on Services. Los Alamitos, CA, USA: IEEE Computer Society, 2012, pp. 24-29.
-
(2012)
IEEE Congress on Services
, pp. 24-29
-
-
Smit, M.1
Pawluk, P.2
Simmons, B.3
Litoiu, M.4
-
19
-
-
80053169900
-
Exploring alternative approaches to implement an elasticity policy
-
H. Ghanbari, B. Simmons, M. Litoiu, and G. Iszlai, "Exploring alternative approaches to implement an elasticity policy," in Cloud Computing (CLOUD), 2011 IEEE International Conference on, 2011, pp. 716-723.
-
Cloud Computing (CLOUD), 2011 IEEE International Conference on, 2011
, pp. 716-723
-
-
Ghanbari, H.1
Simmons, B.2
Litoiu, M.3
Iszlai, G.4
-
20
-
-
84865143184
-
Modelbased adaptive DoS attack mitigation
-
C. Barna, M. Shtern, M. Smit, V. Tzerpos, and M. Litoiu, "Modelbased adaptive DoS attack mitigation," in 7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2012.
-
7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2012
-
-
Barna, C.1
Shtern, M.2
Smit, M.3
Tzerpos, V.4
Litoiu, M.5
-
21
-
-
84871433584
-
Lbnamed: A load balancing name server in Perl
-
Berkeley, CA, USA: USENIX Association
-
R. J. Schemers, III, "lbnamed: A load balancing name server in Perl," in Proceedings of the 9th USENIX conference on System administration. Berkeley, CA, USA: USENIX Association, 1995, pp. 1-12.
-
(1995)
Proceedings of the 9th USENIX Conference on System Administration
, pp. 1-12
-
-
Schemers III, R.J.1
-
22
-
-
84866766729
-
-
November
-
C. Barna, B. Simmons, M. Litoiu, and G. Iszlai, "Multi-model adaptive cloud environments (MACE)," November 2011, http://www.ceraslabs. com/projects/management-services-for-cloud-computing.
-
(2011)
Multi-model Adaptive Cloud Environments (MACE)
-
-
Barna, C.1
Simmons, B.2
Litoiu, M.3
Iszlai, G.4
|