-
2
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds, in 16th ACM CCS, 2009.
-
(2009)
16th ACM CCS
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
3
-
-
0038239585
-
Median-based aggregation operators for prototype construction in ordinal scales
-
J. Domingo-Ferrer and V. Torra Median-based aggregation operators for prototype construction in ordinal scales, Intern. J. Intel. Sys., vol. 18, no. 6, 2003.
-
(2003)
Intern. J. Intel. Sys
, vol.18
, Issue.6
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
4
-
-
79751507697
-
Microdata protection method through microaggregation: A median-based approach
-
M. E. Kabir and H. Wang Microdata protection method through microaggregation: A median-based approach, Information Security J.: A Global Perspective, vol. 20, 2011.
-
(2011)
Information Security J.: A Global Perspective
, vol.20
-
-
Kabir, M.E.1
Wang, H.2
-
6
-
-
0033702592
-
Transforming out timing leaks
-
J. Agat Transforming out timing leaks, in 27th ACM POPL, 2000.
-
(2000)
27th ACM POPL
-
-
Agat, J.1
-
7
-
-
84942242915
-
Observational determinism for concurrent program security
-
S. Zdancewic and A. C. Myers Observational determinism for concurrent program security, in 16th IEEE CSFW, 2003.
-
(2003)
16th IEEE CSFW
-
-
Zdancewic, S.1
Myers, A.C.2
-
8
-
-
84863432828
-
Languagebased control and mitigation of timing channels
-
D. Zhang, A. Askarov, and A. C. Myers Languagebased control and mitigation of timing channels, in 33rd ACM PLDI, 2012.
-
(2012)
33rd ACM PLDI
-
-
Zhang, D.1
Askarov, A.2
Myers, A.C.3
-
9
-
-
74349098073
-
Efficient cache attacks on AES, and countermeasures
-
E. Tromer, D. A. Osvik, and A. Shamir Efficient cache attacks on AES, and countermeasures, J. Cryptology, vol. 23, no. 1, 2010.
-
(2010)
J. Cryptology
, vol.23
, Issue.1
-
-
Tromer, E.1
Osvik, D.A.2
Shamir, A.3
-
10
-
-
74049131554
-
Resource management for isolation enhanced cloud services
-
H. Raj, R. Nathuji, A. Singh, and P. England Resource management for isolation enhanced cloud services, in ACM CCSW, 2009.
-
(2009)
ACM CCSW
-
-
Raj, H.1
Nathuji, R.2
Singh, A.3
England, P.4
-
11
-
-
85073538603
-
STEALTHMEM: System-level protection against cache-based side channel attacks in the cloud
-
T. Kim, M. Peinado, and G. Mainar-Ruiz STEALTHMEM: System-level protection against cache-based side channel attacks in the cloud, in 21st USENIX Security Symp., 2012.
-
(2012)
21st USENIX Security Symp
-
-
Kim, T.1
Peinado, M.2
Mainar-Ruiz, G.3
-
12
-
-
78650017523
-
Predictive black-box mitigation of timing channels
-
A. Askarov, A. C. Myers, and D. Zhang Predictive black-box mitigation of timing channels, in 17th ACM CCS, 2010.
-
(2010)
17th ACM CCS
-
-
Askarov, A.1
Myers, A.C.2
Zhang, D.3
-
14
-
-
0027719713
-
A pump for rapid, reliable, secure communication
-
M. H. Kang and I. S. Moskowitz A pump for rapid, reliable, secure communication, in ACM CCS, 1993.
-
(1993)
ACM CCS
-
-
Kang, M.H.1
Moskowitz, I.S.2
-
15
-
-
0036715113
-
An information-theoretic and game-theoretic study of timing channels
-
J. Giles and B. Hajek An information-theoretic and game-theoretic study of timing channels, IEEE TOIT, vol. 48, no. 9, 2002.
-
(2002)
IEEE TOIT
, vol.48
, Issue.9
-
-
Giles, J.1
Hajek, B.2
-
17
-
-
80755187785
-
Predictive mitigation of timing channels in interactive systems
-
D. Zhang, A. Askarov, and A. C. Myers Predictive mitigation of timing channels in interactive systems, in 18th ACM CCS, 2011.
-
(2011)
18th ACM CCS
-
-
Zhang, D.1
Askarov, A.2
Myers, A.C.3
-
18
-
-
0025564050
-
Implementing fault-tolerant services using the state machine approach: A tutorial
-
F. B. Schneider Implementing fault-tolerant services using the state machine approach: A tutorial, ACM Comp. Surv., vol. 22, no. 4, 1990.
-
(1990)
ACM Comp. Surv
, vol.22
, Issue.4
-
-
Schneider, F.B.1
-
19
-
-
0024606852
-
Fault tolerance under UNIX
-
A. Borg, W. Blau, W. Graetsch, F. Herrmann, and W. Oberle Fault tolerance under UNIX, ACM TOCS, vol. 7, no. 1, 1989.
-
(1989)
ACM TOCS
, vol.7
, Issue.1
-
-
Borg, A.1
Blau, W.2
Graetsch, W.3
Herrmann, F.4
Oberle, W.5
-
20
-
-
84883338701
-
Enforcing determinism for the consistent replication of multithreaded CORBA applications
-
P. Narasimhan, L. E. Moser, and P. M. Melliar-Smith Enforcing determinism for the consistent replication of multithreaded CORBA applications, in IEEE SRDS, 1999.
-
(1999)
IEEE SRDS
-
-
Narasimhan, P.1
Moser, L.E.2
Melliar-Smith, P.M.3
-
21
-
-
33645820246
-
Active replication of multithreaded applications
-
C. Basile, Z. Kalbarczyk, and R. K. Iyer Active replication of multithreaded applications, IEEE TPDS, vol. 17, no. 5, 2006.
-
(2006)
IEEE TPDS
, vol.17
, Issue.5
-
-
Basile, C.1
Kalbarczyk, Z.2
Iyer, R.K.3
-
22
-
-
0030086704
-
Hypervisor-based fault-tolerance
-
T. C. Bressoud and F. B. Schneider Hypervisor-based fault-tolerance, ACM TOCS, vol. 14, no. 1, 1996.
-
(1996)
ACM TOCS
, vol.14
, Issue.1
-
-
Bressoud, T.C.1
Schneider, F.B.2
-
24
-
-
33750340695
-
Behavioral distance for intrusion detection
-
D. Gao, M. K. Reiter, and D. Song Behavioral distance for intrusion detection, in 8th RAID, 2005.
-
(2005)
8th RAID
-
-
Gao, D.1
Reiter, M.K.2
Song, D.3
-
25
-
-
84886393009
-
N-variant systems: A secretless framework for security through diversity
-
B. Cox, D. Evans, A. Filipi, J. Rowanhill, W. Hu, J. Davidson, J. Knight, A. Nguyen-Tuong, and J. Hiser N-variant systems: A secretless framework for security through diversity, in 15th USENIX Security Symp., 2006.
-
(2006)
15th USENIX Security Symp.
-
-
Cox, B.1
Evans, D.2
Filipi, A.3
Rowanhill, J.4
Hu, W.5
Davidson, J.6
Knight, J.7
Nguyen-Tuong, A.8
Hiser, J.9
-
26
-
-
53349142151
-
Security through redundant data diversity
-
A. Nguyen-Tuong, D. Evans, J. C. Knight, B. Cox, and J. W. Davidson Security through redundant data diversity, in 38th DSN, 2008.
-
(2008)
38th DSN
-
-
Nguyen-Tuong, A.1
Evans, D.2
Knight, J.C.3
Cox, B.4
Davidson, J.W.5
-
27
-
-
67649202948
-
Beyond output voting: Detecting compromised replicas using HMMbased behavioral distance
-
D. Gao, M. K. Reiter, and D. Song Beyond output voting: Detecting compromised replicas using HMMbased behavioral distance, IEEE TDSC, vol. 6, no. 2, 2009.
-
(2009)
IEEE TDSC
, vol.6
, Issue.2
-
-
Gao, D.1
Reiter, M.K.2
Song, D.3
-
28
-
-
52649086050
-
ReTrace: Collecting execution trace with virtual machine deterministic replay
-
M. Xu, V. Malyugin, J. Sheldon, G. Venkitachalam, and B. Weissman ReTrace: Collecting execution trace with virtual machine deterministic replay, in 3rd Workshop on Modeling, Benchmarking and Simulation, 2007.
-
(2007)
3rd Workshop on Modeling, Benchmarking and Simulation
-
-
Xu, M.1
Malyugin, V.2
Sheldon, J.3
Venkitachalam, G.4
Weissman, B.5
-
30
-
-
77949581334
-
DMP: Deterministic shared memory multiprocessing
-
J. Devietti, B. Lucia, L. Ceze, and M. Oskin DMP: Deterministic shared memory multiprocessing, IEEE Micro, vol. 30, pp. 41-49, 2010.
-
(2010)
IEEE Micro
, vol.30
, pp. 41-49
-
-
Devietti, J.1
Lucia, B.2
Ceze, L.3
Oskin, M.4
-
35
-
-
84883346620
-
-
Timekeeping in VMware Virtual Machines, VMWare Inc., 2010
-
Timekeeping in VMware Virtual Machines, VMWare Inc., 2010.
-
-
-
-
36
-
-
20344391930
-
Intel virtualization technology
-
R. Uhlig, G. Neiger, D. Rodgers, A. L. Santoni, F. C. M. Martins, A. V. Anderson, S. M. Bennett, A. Kagi, F. H. Leung, and L. Smith Intel virtualization technology, IEEE Comp., vol. 38, no. 3, 2005.
-
(2005)
IEEE Comp
, vol.38
, Issue.3
-
-
Uhlig, R.1
Neiger, G.2
Rodgers, D.3
Santoni, A.L.4
Martins, F.C.M.5
Anderson, A.V.6
Bennett, S.M.7
Kagi, A.8
Leung, F.H.9
Smith, L.10
-
38
-
-
12444288477
-
Byzantine fault-tolerant confidentiality
-
J. Yin, A. Venkataramani, J.-P. Martin, L.Alvisi, and M. Dahlin Byzantine fault-tolerant confidentiality, in Inter. Workshop on Future Directions in Distributed Com-puting, 2002.
-
(2002)
Inter. Workshop on Future Directions in Distributed Com-putting
-
-
Yin, J.1
Venkataramani, A.2
Martin, J.-P.3
Alvisi, L.4
Dahlin, M.5
-
41
-
-
79960963624
-
Maximum packing of the complete graph with uniform length cycles
-
D. Horsley Maximum packing of the complete graph with uniform length cycles, J. Graph Theory, vol. 68, no. 1, 2011.
-
(2011)
J. Graph Theory
, vol.68
, Issue.1
-
-
Horsley, D.1
-
44
-
-
67650722766
-
Distributions of order statistics
-
M. Gungor, Y. Bulut, and S. C? al?k Distributions of order statistics, Appl. Math. Sci., vol. 3, no. 16, 2009.
-
(2009)
Appl. Math. Sci
, vol.3
, Issue.16
-
-
Gungor, M.1
Bulut, Y.2
Calk, S.3
|