메뉴 건너뛰기




Volumn 7839 LNCS, Issue , 2013, Pages 309-323

Trusted launch of virtual machine instances in public IaaS environments

Author keywords

IaaS; OpenStack; security; trusted computing; trusted virtual machine launch

Indexed keywords

IAAS; OPENSTACK; SECURITY; TRUSTED COMPUTING; VIRTUAL MACHINES;

EID: 84875979259     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-37682-5_22     Document Type: Conference Paper
Times cited : (14)

References (21)
  • 5
    • 84875975370 scopus 로고    scopus 로고
    • Trusted Computing - Eine Einführung
    • Pohlmann, N., Reimer, H. (eds.) Vieweg+Teubner doi:10.1007/978-3-8348- 9452-6 1
    • Pohlmann, N., Reimer, H.: Trusted Computing - eine Einführung. In: Pohlmann, N., Reimer, H. (eds.) Trusted Computing, pp. 3-12. Vieweg+Teubner (2008), doi:10.1007/978-3-8348-9452-6 1
    • (2008) Trusted Computing , pp. 3-12
    • Pohlmann, N.1    Reimer, H.2
  • 7
    • 56649102115 scopus 로고    scopus 로고
    • Property-Based TPM Virtualization
    • Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. Springer, Heidelberg
    • Sadeghi, A.-R., Stüble, C., Winandy, M.: Property-Based TPM Virtualization. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 1-16. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5222 , pp. 1-16
    • Sadeghi, A.-R.1    Stüble, C.2    Winandy, M.3
  • 10
    • 84864878200 scopus 로고    scopus 로고
    • Securely Launching Virtual Machines on Trustworthy Platforms in a Public Cloud - An Enterprise's Perspective
    • Leymann, F., Ivanov, I., van Sinderen, M., Shan, T. (eds.) SciTePress
    • Aslam, M., Gehrmann, C., Rasmusson, L., Björkman, M.: Securely Launching Virtual Machines on Trustworthy Platforms in a Public Cloud - An Enterprise's Perspective. In: Leymann, F., Ivanov, I., van Sinderen, M., Shan, T. (eds.) CLOSER, pp. 511-521. SciTePress (2012)
    • (2012) CLOSER , pp. 511-521
    • Aslam, M.1    Gehrmann, C.2    Rasmusson, L.3    Björkman, M.4
  • 12
    • 77954051808 scopus 로고    scopus 로고
    • Technical report, National Institute of Standards and Technology September
    • Mell, P., Gance, T.: The nist definition of cloud computing. Technical report, National Institute of Standards and Technology (September 2011)
    • (2011) The Nist Definition of Cloud Computing
    • Mell, P.1    Gance, T.2
  • 13
    • 80053402847 scopus 로고    scopus 로고
    • Application of a Distributed Security Method to End-2-End Services Security in Independent Heterogeneous Cloud Computing Environments
    • July
    • Goyal, P.: Application of a Distributed Security Method to End-2-End Services Security in Independent Heterogeneous Cloud Computing Environments. In: 2011 IEEE World Congress on Services, pp. 379-384 (July 2011)
    • (2011) 2011 IEEE World Congress on Services , pp. 379-384
    • Goyal, P.1
  • 14
    • 21644486314 scopus 로고    scopus 로고
    • Trusted Computing Group: revision 1.4. Technical report, Trusted Computing Group
    • Trusted Computing Group: TCG Specification, Architecture Overview, revision 1.4. Technical report, Trusted Computing Group (2007)
    • (2007) TCG Specification, Architecture Overview
  • 15
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using diffie-hellman
    • Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
    • Boyko, V., MacKenzie, P., Patel, S.: Provably secure password- authenticated key exchange using diffie-hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 156-171. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 16
    • 56649115709 scopus 로고    scopus 로고
    • The Paradox of Security in Virtual Environments
    • Price, M.: The Paradox of Security in Virtual Environments. Computer 41(11), 22-28 (2008)
    • (2008) Computer , vol.41 , Issue.11 , pp. 22-28
    • Price, M.1
  • 20
    • 84857150602 scopus 로고    scopus 로고
    • Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud
    • Molnar, D., Schechter, S.: Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud. In: Workshop of the Economics of Cloud Security, pp. 1-18 (2010)
    • (2010) Workshop of the Economics of Cloud Security , pp. 1-18
    • Molnar, D.1    Schechter, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.