-
3
-
-
80955143542
-
All Your Clouds are Belong to us: Security Analysis of Cloud Management Interfaces
-
ACM, New York
-
Somorovsky, J., Heiderich, M., Jensen, M., Schwenk, J., Gruschka, N., Lo Iacono, L.: All Your Clouds are Belong to us: Security Analysis of Cloud Management Interfaces. In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security, CCSW 2011, pp. 3-14. ACM, New York (2011)
-
(2011)
Proceedings of the 3rd ACM Workshop on Cloud Computing Security, CCSW 2011
, pp. 3-14
-
-
Somorovsky, J.1
Heiderich, M.2
Jensen, M.3
Schwenk, J.4
Gruschka, N.5
Lo Iacono, L.6
-
4
-
-
74049152260
-
Hey, You, Get off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds
-
ACM, New York
-
Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 199-212. ACM, New York (2009)
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
5
-
-
84875975370
-
Trusted Computing - Eine Einführung
-
Pohlmann, N., Reimer, H. (eds.) Vieweg+Teubner doi:10.1007/978-3-8348- 9452-6 1
-
Pohlmann, N., Reimer, H.: Trusted Computing - eine Einführung. In: Pohlmann, N., Reimer, H. (eds.) Trusted Computing, pp. 3-12. Vieweg+Teubner (2008), doi:10.1007/978-3-8348-9452-6 1
-
(2008)
Trusted Computing
, pp. 3-12
-
-
Pohlmann, N.1
Reimer, H.2
-
6
-
-
79961133763
-
Implementing Trust in Cloud Infrastructures
-
May
-
Neisse, R., Holling, D., Pretschner, A.: Implementing Trust in Cloud Infrastructures. In: 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pp. 524-533 (May 2011)
-
(2011)
2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)
, pp. 524-533
-
-
Neisse, R.1
Holling, D.2
Pretschner, A.3
-
7
-
-
56649102115
-
Property-Based TPM Virtualization
-
Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. Springer, Heidelberg
-
Sadeghi, A.-R., Stüble, C., Winandy, M.: Property-Based TPM Virtualization. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 1-16. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5222
, pp. 1-16
-
-
Sadeghi, A.-R.1
Stüble, C.2
Winandy, M.3
-
8
-
-
84855701474
-
Enabling Secure VM-vTPM Migration in Private Clouds
-
ACM, New York
-
Danev, B., Masti, R.J., Karame, G.O., Capkun, S.: Enabling Secure VM-vTPM Migration in Private Clouds. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011, pp. 187-196. ACM, New York (2011)
-
(2011)
Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011
, pp. 187-196
-
-
Danev, B.1
Masti, R.J.2
Karame, G.O.3
Capkun, S.4
-
9
-
-
84929445167
-
Towards Trusted Cloud Computing
-
USENIX Association, Berkeley
-
Santos, N., Gummadi, K.P., Rodrigues, R.: Towards Trusted Cloud Computing. In: Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, HotCloud 2009. USENIX Association, Berkeley (2009)
-
(2009)
Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, HotCloud 2009
-
-
Santos, N.1
Gummadi, K.P.2
Rodrigues, R.3
-
10
-
-
84864878200
-
Securely Launching Virtual Machines on Trustworthy Platforms in a Public Cloud - An Enterprise's Perspective
-
Leymann, F., Ivanov, I., van Sinderen, M., Shan, T. (eds.) SciTePress
-
Aslam, M., Gehrmann, C., Rasmusson, L., Björkman, M.: Securely Launching Virtual Machines on Trustworthy Platforms in a Public Cloud - An Enterprise's Perspective. In: Leymann, F., Ivanov, I., van Sinderen, M., Shan, T. (eds.) CLOSER, pp. 511-521. SciTePress (2012)
-
(2012)
CLOSER
, pp. 511-521
-
-
Aslam, M.1
Gehrmann, C.2
Rasmusson, L.3
Björkman, M.4
-
11
-
-
84868116561
-
Security and Trust Preserving VM Migrations in Public Clouds
-
Aslam, M., Gehrmann, C., Björkman, M.: Security and Trust Preserving VM Migrations in Public Clouds. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Liverpool (2012)
-
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Liverpool (2012)
-
-
Aslam, M.1
Gehrmann, C.2
Björkman, M.3
-
12
-
-
77954051808
-
-
Technical report, National Institute of Standards and Technology September
-
Mell, P., Gance, T.: The nist definition of cloud computing. Technical report, National Institute of Standards and Technology (September 2011)
-
(2011)
The Nist Definition of Cloud Computing
-
-
Mell, P.1
Gance, T.2
-
13
-
-
80053402847
-
Application of a Distributed Security Method to End-2-End Services Security in Independent Heterogeneous Cloud Computing Environments
-
July
-
Goyal, P.: Application of a Distributed Security Method to End-2-End Services Security in Independent Heterogeneous Cloud Computing Environments. In: 2011 IEEE World Congress on Services, pp. 379-384 (July 2011)
-
(2011)
2011 IEEE World Congress on Services
, pp. 379-384
-
-
Goyal, P.1
-
14
-
-
21644486314
-
-
Trusted Computing Group: revision 1.4. Technical report, Trusted Computing Group
-
Trusted Computing Group: TCG Specification, Architecture Overview, revision 1.4. Technical report, Trusted Computing Group (2007)
-
(2007)
TCG Specification, Architecture Overview
-
-
-
15
-
-
84937550984
-
Provably secure password-authenticated key exchange using diffie-hellman
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Boyko, V., MacKenzie, P., Patel, S.: Provably secure password- authenticated key exchange using diffie-hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 156-171. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
16
-
-
56649115709
-
The Paradox of Security in Virtual Environments
-
Price, M.: The Paradox of Security in Virtual Environments. Computer 41(11), 22-28 (2008)
-
(2008)
Computer
, vol.41
, Issue.11
, pp. 22-28
-
-
Price, M.1
-
17
-
-
84875994261
-
Attacking intel trusted execution technology
-
Wojtczuk, R., Rutkowska, J., Tereshkin, A.: Attacking intel trusted execution technology. In: Black Hat USA 2008, Las Vegas, NV, August 7 (2008)
-
Black Hat USA 2008, Las Vegas, NV, August 7 (2008)
-
-
Wojtczuk, R.1
Rutkowska, J.2
Tereshkin, A.3
-
18
-
-
66149173689
-
Lest We Remember: Cold-Boot Attacks on Encryption Keys
-
Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest We Remember: Cold-Boot Attacks on Encryption Keys. Commun. ACM 52, 91-98 (2009)
-
(2009)
Commun. ACM
, vol.52
, pp. 91-98
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
19
-
-
78650083239
-
Seeding Clouds with Trust Anchors
-
ACM, New York
-
Schiffman, J., Moyer, T., Vijayakumar, H., Jaeger, T., McDaniel, P.: Seeding Clouds With Trust Anchors. In: Proceedings of the, ACM Workshop on Cloud Computing Security, CCSW 2010, pp. 43-46. ACM, New York (2010)
-
(2010)
Proceedings of The, ACM Workshop on Cloud Computing Security, CCSW 2010
, pp. 43-46
-
-
Schiffman, J.1
Moyer, T.2
Vijayakumar, H.3
Jaeger, T.4
McDaniel, P.5
-
20
-
-
84857150602
-
Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud
-
Molnar, D., Schechter, S.: Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud. In: Workshop of the Economics of Cloud Security, pp. 1-18 (2010)
-
(2010)
Workshop of the Economics of Cloud Security
, pp. 1-18
-
-
Molnar, D.1
Schechter, S.2
-
21
-
-
84875983727
-
-
Technical Report UCB/EECS-2010-5, EECS Department, University of California, Berkeley January
-
Chen, Y., Paxson, V., Katz, R.: The Hybrex Model for Confidentiality and Privacy in Cloud Computing. Technical Report UCB/EECS-2010-5, EECS Department, University of California, Berkeley (January 2010)
-
(2010)
The Hybrex Model for Confidentiality and Privacy in Cloud Computing
-
-
Chen, Y.1
Paxson, V.2
Katz, R.3
|