-
2
-
-
68249129760
-
-
Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley, Feb 2009
-
Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.D.; Katz, R.H.; Konwinski, A.; Lee, G.; Patterson, D.A.; Rabkin, A.; Stoica, I.; Zaharia, M.: Above the clouds: a Berkeley view of cloud computing. Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley, Feb 2009. http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html
-
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
3
-
-
58049139900
-
Tamper-Resistant Execution in an Untrusted Operating System Using A Virtual Machine Monitor
-
Parallel Processing Institute, Fudan University, Aug 2007
-
Chen, H.; Zhang, F.; Chen, C.; Chen, R.; Zang, B.; Yew, P.; Mao, W.: Tamper-Resistant Execution in an Untrusted Operating System Using A Virtual Machine Monitor. Technical Report 2007-08001, Parallel Processing Institute, Fudan University, Aug 2007
-
Technical Report 2007-08001
-
-
Chen, H.1
Zhang, F.2
Chen, C.3
Chen, R.4
Zang, B.5
Yew, P.6
Mao, W.7
-
4
-
-
77957810674
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
ACM, New York
-
Chen, X.; Garfinkel, T.; Lewis, E.C.; Subrahmanyam, P.; Waldspurger, C.A.; Boneh, D.; Dwoskin, J.; Ports, D.R.K.: Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. In: Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 2-13. ACM, New York (2008)
-
(2008)
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 2-13
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.K.8
-
6
-
-
35348963573
-
Daonity-grid security from two levels of virtualization
-
10.1016/j.istr.2007.05.005
-
Chen, H.; Chen, J.; Mao, W.; Yan, F.: Daonity-grid security from two levels of virtualization. Inf. Secur. Tech. Rep. 12(3), 123-138 (2007)
-
(2007)
Inf. Secur. Tech. Rep.
, vol.12
, Issue.3
, pp. 123-138
-
-
Chen, H.1
Chen, J.2
Mao, W.3
Yan, F.4
-
7
-
-
70249085218
-
A hypervisor-based system for protecting software runtime memory and persistent storage
-
International San Diego, CA
-
Dewan, P.; Durham, D.; Khosravi, H.; Long, M.; Nagabhushan, G.: A hypervisor-based system for protecting software runtime memory and persistent storage. In: Proceedings of the Spring Simulation Multiconference. The Society for Computer Simulation, pp. 828-835. International San Diego, CA (2008)
-
(2008)
Proceedings of the Spring Simulation Multiconference. The Society for Computer Simulation
, pp. 828-835
-
-
Dewan, P.1
Durham, D.2
Khosravi, H.3
Long, M.4
Nagabhushan, G.5
-
8
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
Sailer, R.; Zhang, X.; Jaeger, X.; Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the USENIX Security Symposium, pp. 223-238 (2004)
-
(2004)
Proceedings of the USENIX Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, X.3
Doorn, L.4
-
9
-
-
85059766484
-
Live migration of virtual machines
-
Clark, C.; Fraser, K.; Hand, S.; Hansen, J.G.; Jul, E.; Limpach, C.; Pratt, I.; Warfield, A.: Live migration of virtual machines. In: Proceedings of the Symposium on Networked Systems Design and Implementation, pp. 273-286 (2005)
-
(2005)
Proceedings of the Symposium on Networked Systems Design and Implementation
, pp. 273-286
-
-
Clark, C.1
Fraser, K.2
Hand, S.3
Hansen, J.G.4
Jul, E.5
Limpach, C.6
Pratt, I.7
Warfield, A.8
-
10
-
-
85063207021
-
Black-box and gray-box strategies for virtual machine migration
-
Wood, T.; Shenoy, P.; Venkataramani, A.; Yousif, M.: Black-box and gray-box strategies for virtual machine migration. In: Proceedings of Usenix Conference on Networked Systems Design and Implementation, pp. 229-242 (2007)
-
(2007)
Proceedings of Usenix Conference on Networked Systems Design and Implementation
, pp. 229-242
-
-
Wood, T.1
Shenoy, P.2
Venkataramani, A.3
Yousif, M.4
-
12
-
-
0016336411
-
Operating system integrity in OS/VS2
-
McPhee, W.S.: Operating system integrity in OS/VS2. IBM J. Res. Dev. 13(3), 230 (1974)
-
(1974)
IBM J. Res. Dev.
, vol.13
, Issue.3
, pp. 230
-
-
McPhee, W.S.1
-
13
-
-
0030092390
-
Checking for race conditions in file accesses
-
Bishop, M.; Dilger, M.: Checking for race conditions in file accesses. Comput. Syst. 2(2), 131-152 (1996)
-
(1996)
Comput. Syst.
, vol.2
, Issue.2
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
14
-
-
21644433634
-
Xen and the art of virtualization
-
ACM, New York
-
Barham, P.; Dragovic, B.; Fraser, K.; Hand, S.; Harris, T.; Ho, A.; Neugebauer, R.; Pratt, I.; Warfield, A.: Xen and the art of virtualization. In: Proceedings of the ACM Symposium on Operating Systems Principles, pp. 164-177. ACM, New York (2003)
-
(2003)
Proceedings of the ACM Symposium on Operating Systems Principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
15
-
-
58049137106
-
PALM: Security preserving VM live migration for systems with VMM-enforced protection
-
IEEE Computer Society
-
Zhang, F.; Huang, Y.; Wang, H.; Chen, H.; Zang, B.: PALM: security preserving VM live migration for systems with VMM-enforced protection. In: Proceedings of the 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference, pp. 9-18. IEEE Computer Society (2008)
-
(2008)
Proceedings of the 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference
, pp. 9-18
-
-
Zhang, F.1
Huang, Y.2
Wang, H.3
Chen, H.4
Zang, B.5
-
16
-
-
54249122693
-
TOCTOU, Traps, and Trusted Computing
-
Bratus, S.; D'Cunha, N.; Sparks, E.; Smith, S.: TOCTOU, Traps, and Trusted Computing. Trusted Computing-Challenges and Applications, pp. 14-32 (2008)
-
(2008)
Trusted Computing-Challenges and Applications
, pp. 14-32
-
-
Bratus, S.1
D'Cunha, N.2
Sparks, E.3
Smith, S.4
-
19
-
-
70350699446
-
Cache missing for fun and profit
-
Ottawa, Canada
-
Percival, C.: Cache missing for fun and profit. In: Proceedings of BSDCan, Ottawa, Canada, 2005. http://www.daemonology.net/hyperthreading- considered-harmful
-
(2005)
Proceedings of BSDCan
-
-
Percival, C.1
-
26
-
-
84885299484
-
-
Tom Espiner
-
Tom Espiner: http://news.zdnet.co.uk/security/0,1000000189,39290616,00. htm, 2007
-
(2007)
-
-
-
27
-
-
84885301792
-
-
Amazon. Amazon web services customer agreement, Oct 2009
-
Amazon. Amazon web services customer agreement, Oct 2009. http://aws.amazon.com/agreement/#7
-
-
-
-
28
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
Halderman, J.A.; Schoen, S.D.; Heninger, N.; Clarkson, W.; Paul, W.; Calandrino, J.A.; Feldman, A.J.; Appelbaum, J.; Felten, E.W.: Lest we remember: cold boot attacks on encryption keys. In: Proceedings of the USENIX Security Symposium, pp. 45-60 (2008)
-
(2008)
Proceedings of the USENIX Security Symposium
, pp. 45-60
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
33
-
-
84885327279
-
-
EMC Corp. Daoli trust cloud infrastructure
-
EMC Corp. Daoli trust cloud infrastructure. http://www.daoliproject.org/, 2007
-
(2007)
-
-
-
34
-
-
84978370540
-
Optimizing the migration of virtual computers
-
Boston, MA Dec 2002
-
Sapuntzakis, C.P.; Chandra, R.; Pfaff, B.; Chow, J.; Lam, M.S.; Rosenblum, M.: Optimizing the migration of virtual computers. In: Proceedings of the 5th ACM Symposium on Operating Systems Design and Implementation (OSDI), pp. 377-390, Boston, MA Dec 2002
-
Proceedings of the 5th ACM Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 377-390
-
-
Sapuntzakis, C.P.1
Chandra, R.2
Pfaff, B.3
Chow, J.4
Lam, M.S.5
Rosenblum, M.6
-
36
-
-
24944454415
-
-
Master's thesis, Depaerment of Computer Science, University of Copenhagen, Denmark
-
Hansen, J.G.; Henriksen, A.K.: Nomadic operating systems. Master's thesis, Depaerment of Computer Science, University of Copenhagen, Denmark (2002)
-
(2002)
Nomadic Operating Systems
-
-
Hansen, J.G.1
Henriksen, A.K.2
-
37
-
-
72049115513
-
Live virtual machine migration with adaptive memory compression
-
Jin, H.; Deng, L.; Wu, S.; Shi, X.; Pan, X.: Live virtual machine migration with adaptive memory compression. In: Proceedings of IEEE International Conference on Cluster Computing. IEEE (2009)
-
(2009)
Proceedings of IEEE International Conference on Cluster Computing. IEEE
-
-
Jin, H.1
Deng, L.2
Wu, S.3
Shi, X.4
Pan, X.5
-
38
-
-
70449644846
-
Live migration of virtual machine based on full system trace and replay
-
ACM, New York
-
Liu, H.; Jin, H.; Liao, X.; Hu, L.; Yu, C.: Live migration of virtual machine based on full system trace and replay. In: Proceedings of the 18th ACM International Symposium on High Performance Distributed Computing, pp. 101-110. ACM, New York (2009)
-
(2009)
Proceedings of the 18th ACM International Symposium on High Performance Distributed Computing
, pp. 101-110
-
-
Liu, H.1
Jin, H.2
Liao, X.3
Hu, L.4
Yu, C.5
-
39
-
-
84863139870
-
Heterogeneous live migration of virtual machines
-
Liu, P.; Yang, Z.; Song, X.; Zhou, Y.; Chen, H.; Zang, B.: Heterogeneous live migration of virtual machines. In: Proceedings of International Workshop on Virtualization Technology (2008)
-
(2008)
Proceedings of International Workshop on Virtualization Technology
-
-
Liu, P.1
Yang, Z.2
Song, X.3
Zhou, Y.4
Chen, H.5
Zang, B.6
-
40
-
-
74749092816
-
Seamless virtual machine live migration on network security enhanced hypervisor
-
IEEE
-
Xianqin, C.; Han, W.; Sumei, W.; Xiang, L.: Seamless virtual machine live migration on network security enhanced hypervisor. In Procceding of IEEE International Conference on Broadband Network and Multimedia Technology, pp. 847-853. IEEE (2009)
-
(2009)
Procceding of IEEE International Conference on Broadband Network and Multimedia Technology
, pp. 847-853
-
-
Xianqin, C.1
Han, W.2
Sumei, W.3
Xiang, L.4
-
41
-
-
84885319703
-
-
VMware Corp
-
VMware Corp. Virtual Infrastructure 3, 2007. http://www.vmware.com/ products/vi
-
(2007)
Virtual Infrastructure 3
-
-
-
42
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
Garfinkel, T.; Pfaff, B.; Chow, J.; Rosenblum, M.; Boneh, D.: Terra: a virtual machine-based platform for trusted computing. In: Proceedings of the ACM Symposium on Operating Systems Principles, pp. 193-206 (2003)
-
(2003)
Proceedings of the ACM Symposium on Operating Systems Principles
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
43
-
-
33646445517
-
NGSCB: A trusted open system
-
Peinado, M.; Chen, Y.; England, P.; Manferdelli, J.: NGSCB: a trusted open system. In: Proceedings of ACISP, pp. 86-97 (2004)
-
(2004)
Proceedings of ACISP
, pp. 86-97
-
-
Peinado, M.1
Chen, Y.2
England, P.3
Manferdelli, J.4
-
44
-
-
38049026664
-
An open trusted computing architecture-secure virtual machines enabling user-defined policy enforcement
-
IBM Research
-
Kuhlmann, D.; Landfermann, R.; Ramasamy, H.; Schunter, M.; Ramunno, G.; Vernizzi, D.: An open trusted computing architecture-secure virtual machines enabling user-defined policy enforcement. Technical Report RZ3655, IBM Research, 2006. http://www.opentc.net/activities/otc-HighLevelOverview/OTC-Architecture- High-level-overview.pdf
-
(2006)
Technical Report RZ3655
-
-
Kuhlmann, D.1
Landfermann, R.2
Ramasamy, H.3
Schunter, M.4
Ramunno, G.5
Vernizzi, D.6
-
45
-
-
84885329022
-
-
System Architecture Group White paper, University of Karlsruhe, Germany
-
System Architecture Group. L4Ka::Pistachio Whitepaper. White paper, University of Karlsruhe, Germany (2003)
-
(2003)
L4Ka::Pistachio Whitepaper
-
-
-
47
-
-
51949119355
-
SHype: Secure Hypervisor Approach to Trusted Virtualized Systems
-
IBM Research, Feb 2005
-
Sailer, R.; Valdez, E.; Jaeger, T.; Perez, R.; van Doorn, L.; Griffin, J.L.; Berger, S.: sHype: Secure Hypervisor Approach to Trusted Virtualized Systems. Technical Report RC23511, IBM Research, Feb 2005
-
Technical Report RC23511
-
-
Sailer, R.1
Valdez, E.2
Jaeger, T.3
Perez, R.4
Van Doorn, L.5
Griffin, J.L.6
Berger, S.7
-
48
-
-
84885294884
-
-
Intel Corp. Intel Trusted Execution Technology, 2008
-
Intel Corp. Intel Trusted Execution Technology, 2008. http://www.intel.com/technology/security
-
-
-
-
49
-
-
24944584954
-
-
Intel Technical Report 252491-001, Intel Corporation, Sep. 2003
-
Intel. LaGrande Technology Architectural Overview. Technical Report 252491-001, Intel Corporation, Sep. 2003
-
LaGrande Technology Architectural Overview
-
-
-
50
-
-
23444440332
-
Trusted computing using AMD
-
1441432 10.1016/j.istr.2005.05.006
-
Strongin, G.: Trusted computing using AMD. Inf. Secur. Tech. Rep. 10(2), 120-132 (2005)
-
(2005)
Inf. Secur. Tech. Rep.
, vol.10
, Issue.2
, pp. 120-132
-
-
Strongin, G.1
-
54
-
-
27544511310
-
Architecture for protecting critical secrets in microprocessors
-
Lee, R.B.; Kwan, P.C.S.; McGregor, J.P.; Dwoskin, J.; Wang, Z.: Architecture for protecting critical secrets in microprocessors. In: Proceedings of International Symposium on Computer Architecture, pp. 2-13 (2005)
-
(2005)
Proceedings of International Symposium on Computer Architecture
, pp. 2-13
-
-
Lee, R.B.1
Kwan, P.C.S.2
McGregor, J.P.3
Dwoskin, J.4
Wang, Z.5
-
55
-
-
42549167254
-
Hardware-rooted trust for secure key management and transient trust
-
Alexandria, VA, Oct 2007
-
Dwoskin, J.; Lee, R.B.: Hardware-rooted trust for secure key management and transient trust. In: Proceedings of ACM conference on Computer and Communications Security, pp. 389-400, Alexandria, VA, Oct 2007
-
Proceedings of ACM Conference on Computer and Communications Security
, pp. 389-400
-
-
Dwoskin, J.1
Lee, R.B.2
-
56
-
-
27544441530
-
Design and implementation of the aegis single-chip secure processor using physical random functions
-
Suh, G.E.; O'Donnell, C.W.; Sachdev, I.; Devadas, S.: Design and implementation of the aegis single-chip secure processor using physical random functions. In: Proceedings of International Symposium on Computer Architecture, pp. 25-36 (2005)
-
(2005)
Proceedings of International Symposium on Computer Architecture
, pp. 25-36
-
-
Suh, G.E.1
O'Donnell, C.W.2
Sachdev, I.3
Devadas, S.4
-
57
-
-
1142280988
-
AEGIS: Architecture for tamper-evident and tamper-resistant processing
-
ACM Press, New York, NY
-
Suh, G.E.; Clarke, D.; Gassend, B.; van Dijk, M.; Devadas, S.: AEGIS: architecture for tamper-evident and tamper-resistant processing. In: Proceedings of the Annual international conference on Supercomputing, pp. 160-171. ACM Press, New York, NY (2003)
-
(2003)
Proceedings of the Annual International Conference on Supercomputing
, pp. 160-171
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
|