-
1
-
-
84885890817
-
-
website
-
SAIL project website (2010), http://www.sail-project.eu/
-
(2010)
-
-
-
2
-
-
78650593419
-
Cybercrime 2.0: When the cloud turns dark
-
Provos, N., Rajab, M.A., Mavrommatis, P.: Cybercrime 2.0: When the cloud turns dark. Queue 7(2), 46-47 (2009)
-
(2009)
Queue
, vol.7
, Issue.2
, pp. 46-47
-
-
Provos, N.1
Rajab, M.A.2
Mavrommatis, P.3
-
3
-
-
34547501234
-
MIT Centennial Speech of 1961 cited in Architects of the Information Society
-
Garfinkel, S.L. (ed.) MIT, Cambridge
-
McCarthy, J.: MIT Centennial Speech of 1961 cited in Architects of the Information Society. In: Garfinkel, S.L. (ed.) Thirty-five Years of the Laboratory for Computer Science. MIT, Cambridge (1999)
-
(1999)
Thirty-five Years of the Laboratory for Computer Science
-
-
McCarthy, J.1
-
4
-
-
68249129760
-
-
Tech. Rep. UCB/EECS-2009-28, EECS Department, University of California, Berkeley
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing. Tech. Rep. UCB/EECS-2009-28, EECS Department, University of California, Berkeley (2009)
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
5
-
-
21644433634
-
XEN and the art of virtualization
-
ACM, New York
-
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: XEN and the art of virtualization. In: SOSP 2003: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, pp. 164-177. ACM, New York (2003)
-
(2003)
SOSP 2003: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
6
-
-
84885888104
-
-
VMware (2010), http://www.vmware.com
-
(2010)
-
-
-
7
-
-
78650620243
-
-
Tech. Rep. HPL-2009-231, HP Laboratories
-
Edwards, A., Fischer, A., Lain, A.: Diverter: A new approach to networking within virtualized infrastructures. Tech. Rep. HPL-2009-231, HP Laboratories (2009)
-
(2009)
Diverter: A New Approach to Networking Within Virtualized Infrastructures
-
-
Edwards, A.1
Fischer, A.2
Lain, A.3
-
9
-
-
78650612154
-
-
Intel virtualization (2010), http://www.intel.com/technology/ virtualization/
-
(2010)
Intel Virtualization
-
-
-
11
-
-
34948877584
-
The canadian response to the USA Patriot Act
-
Fraser, D.: The canadian response to the USA Patriot Act. IEEE Security Privacy 5(5), 66-68 (2007)
-
(2007)
IEEE Security Privacy
, vol.5
, Issue.5
, pp. 66-68
-
-
Fraser, D.1
-
12
-
-
24944574585
-
Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (directive on privacy and electronic communications)
-
Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (directive on privacy and electronic communications). Official Journal of the European Union, L201, 0037-0047 (2002)
-
(2002)
Official Journal of the European Union
, vol.L201
, pp. 0037-0047
-
-
-
14
-
-
33745196858
-
Insight and perspectives for content delivery networks
-
Pallis, G., Vakali, A.: Insight and perspectives for content delivery networks. Commun. ACM 49(1), 101-106 (2006)
-
(2006)
Commun. ACM
, vol.49
, Issue.1
, pp. 101-106
-
-
Pallis, G.1
Vakali, A.2
-
15
-
-
77249132188
-
A survey of network virtualization
-
Chowdhury, N.M.K., Boutaba, R.: A survey of network virtualization. Computer Networks 54(5), 862-876 (2010)
-
(2010)
Computer Networks
, vol.54
, Issue.5
, pp. 862-876
-
-
Chowdhury, N.M.K.1
Boutaba, R.2
-
16
-
-
33750303852
-
VINI veritas: Realistic and controlled network experimentation
-
ACM, New York
-
Bavier, A., Feamster, N., Huang, M., Peterson, L., Rexford, J.: In VINI veritas: realistic and controlled network experimentation. In: SIGCOMM 2006: Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 3-14. ACM, New York (2006)
-
(2006)
SIGCOMM 2006: Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 3-14
-
-
Bavier, A.1
Feamster, N.2
Huang, M.3
Peterson, L.4
Rexford, J.5
-
17
-
-
84876357755
-
How to lease the internet in your spare time
-
Feamster, N., Gao, L., Rexford, J.: How to lease the internet in your spare time. SIGCOMM Comput. Commun. Rev. 37(1), 61-64 (2007)
-
(2007)
SIGCOMM Comput. Commun. Rev.
, vol.37
, Issue.1
, pp. 61-64
-
-
Feamster, N.1
Gao, L.2
Rexford, J.3
-
18
-
-
84977824459
-
Network virtualization architecture: Proposal and initial prototype
-
ACM, New York
-
Schaffrath, G., Werle, C., Papadimitriou, P., Feldmann, A., Bless, R., Greenhalgh, A., Wundsam, A., Kind, M., Maennel, O., Mathy, L.: Network virtualization architecture: proposal and initial prototype. In: VISA 2009: Proceedings of the 1st ACM Workshop on Virtualized Infrastructure Systems and Architectures, pp. 63-72. ACM, New York (2009)
-
(2009)
VISA 2009: Proceedings of the 1st ACM Workshop on Virtualized Infrastructure Systems and Architectures
, pp. 63-72
-
-
Schaffrath, G.1
Werle, C.2
Papadimitriou, P.3
Feldmann, A.4
Bless, R.5
Greenhalgh, A.6
Wundsam, A.7
Kind, M.8
Maennel, O.9
Mathy, L.10
-
19
-
-
84885886430
-
-
Federated E-infrastructure Dedicated to European Researchers Innovating in Computing network Architectures
-
FEDERICA: Federated E-infrastructure Dedicated to European Researchers Innovating in Computing network Architectures (2010), http://www.fp7-federica. eu/
-
(2010)
-
-
-
20
-
-
65249152909
-
Virtual routers on the move: Live router migration as a network-management primitive
-
Wang, Y., Keller, E., Biskeborn, B., Van der Merwe, J., Rexford, J.: Virtual routers on the move: live router migration as a network-management primitive. SIGCOMM Comput. Commun. Rev. 38(4), 231-242 (2008)
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.4
, pp. 231-242
-
-
Wang, Y.1
Keller, E.2
Biskeborn, B.3
Van Der Merwe, J.4
Rexford, J.5
-
22
-
-
78650607340
-
-
Tech. rep., Institute for Secure Information Technology SIT
-
Streitberger, W., Ruppel, A.: Cloud computing security - protection goals, taxonomy, market review. Tech. rep., Institute for Secure Information Technology SIT (2010)
-
(2010)
Cloud Computing Security - Protection Goals, Taxonomy, Market Review
-
-
Streitberger, W.1
Ruppel, A.2
-
23
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM, New York
-
Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: CCS 2009: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 199-212. ACM, New York (2009)
-
(2009)
CCS 2009: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
24
-
-
60849083522
-
XeNA: An access negotiation framework using XACML
-
Abi Haidar, D., Cuppens-Boulahia, N., Cuppens, F., Debar, H.: XeNA: an access negotiation framework using XACML. Annals of Telecommunications 64(1), 155-169 (2009)
-
(2009)
Annals of Telecommunications
, vol.64
, Issue.1
, pp. 155-169
-
-
Abi Haidar, D.1
Cuppens-Boulahia, N.2
Cuppens, F.3
Debar, H.4
-
26
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465-482. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
27
-
-
77952407814
-
Organization Based Access Control
-
Abou El Kalam, A., Baida, R.E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miège, A., Saurel, C., Trouessin, G.: Organization Based Access Control. In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks, Policy 2003 (2003)
-
(2003)
4th IEEE International Workshop on Policies for Distributed Systems and Networks, Policy 2003
-
-
Abou El Kalam, A.1
Baida, R.E.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Miège, A.7
Saurel, C.8
Trouessin, G.9
-
28
-
-
84885894118
-
-
XEN networking blog (2010), http://wiki.xensource.com/xenwiki/ XenNetworking
-
(2010)
XEN Networking Blog
-
-
-
31
-
-
20344391930
-
Intel virtualization technology
-
Uhlig, R., Neiger, G., Rodgers, D., Santoni, A., Martins, F., Anderson, A., Bennett, S., Kagi, A., Leung, F., Smith, L.: Intel virtualization technology. Computer 38(5), 48-56 (2005)
-
(2005)
Computer
, vol.38
, Issue.5
, pp. 48-56
-
-
Uhlig, R.1
Neiger, G.2
Rodgers, D.3
Santoni, A.4
Martins, F.5
Anderson, A.6
Bennett, S.7
Kagi, A.8
Leung, F.9
Smith, L.10
-
32
-
-
56649115709
-
The Paradox of Security in Virtual Environments
-
Price, M., Partners, A.: The Paradox of Security in Virtual Environments. Computer 41(11), 22-28 (2008)
-
(2008)
Computer
, vol.41
, Issue.11
, pp. 22-28
-
-
Price, M.1
Partners, A.2
-
33
-
-
33751032041
-
SubVirt: Implementing malware with virtual machines
-
King, S.T., Chen, P.M., Wang, Y.M., Verbowski, C., Wang, H.J., Lorch, J.R.: SubVirt: Implementing malware with virtual machines. In: IEEE Symposium on Security and Privacy, pp. 314-327 (2006)
-
(2006)
IEEE Symposium on Security and Privacy
, pp. 314-327
-
-
King, S.T.1
Chen, P.M.2
Wang, Y.M.3
Verbowski, C.4
Wang, H.J.5
Lorch, J.R.6
-
34
-
-
84885890136
-
-
CA Community Blog: Zeus "in-the-cloud" (2009), http://community.ca.com/ blogs/securityadvisor/archive/2009/12/09/zeus-in-the- cloud.aspx
-
(2009)
CA Community Blog: Zeus "In-the-cloud"
-
-
|