-
1
-
-
84866613066
-
Integration of clever clouds with third party software systems through a rest web service interface
-
A. Celesti, F. Tusa, M. Villari, and A. Puliafito, "Integration of clever clouds with third party software systems through a rest web service interface, " in Proceedings-IEEE Symposium on Computers and Communications, pp. 000827-000832, 2012.
-
(2012)
Proceedings-IEEE Symposium on Computers and Communications
, pp. 000827-000832
-
-
Celesti, A.1
Tusa, F.2
Villari, M.3
Puliafito, A.4
-
2
-
-
84897732152
-
Data on-boarding in federated storage clouds
-
June 27-July 2, 2013, Santa Clara Marriott, CA, USA
-
G. Vernik, A. Shulman-Peleg, S. Dippl, C. Formisano, M. Jaeger, E. Kolodner, and M. Villari, "Data on-boarding in federated storage clouds, " in IEEE CLOUD 2013 IEEE 6th International Conference on Cloud Computing June 27-July 2, 2013, Santa Clara Marriott, CA, USA, 2013.
-
(2013)
IEEE CLOUD 2013 IEEE 6th International Conference on Cloud Computing
-
-
Vernik, G.1
Shulman-Peleg, A.2
Dippl, S.3
Formisano, C.4
Jaeger, M.5
Kolodner, E.6
Villari, M.7
-
3
-
-
84899723935
-
Draco paas: A distributed resilient adaptable cloud oriented platform
-
(Los Alamitos, CA, USA), IEEE Computer Society
-
A. Celesti, N. Peditto, F. Verboso, M. Villari, and A. Puliafito, "Draco paas: a distributed resilient adaptable cloud oriented platform, " in IEEE 27th International Parallel and Distributed Processing Symposium, (Los Alamitos, CA, USA), pp. 1490-1497, IEEE Computer Society, 2013.
-
(2013)
IEEE 27th International Parallel and Distributed Processing Symposium
, pp. 1490-1497
-
-
Celesti, A.1
Peditto, N.2
Verboso, F.3
Villari, M.4
Puliafito, A.5
-
4
-
-
84887927919
-
-
Trusted Computing Group (TCG)
-
Trusted Computing Group (TCG): http://www.trustedcomputinggroup.org.
-
-
-
-
6
-
-
70449632948
-
A trusted platform module based anti-forensics system
-
june
-
W. Goh, P. C. Leong, and C. K. Yeo, "A trusted platform module based anti-forensics system, " in Network and Service Security, 2009. N2S '09. International Conference on, pp. 1-5, june 2009.
-
(2009)
Network and Service Security, 2009. N2S '09. International Conference on
, pp. 1-5
-
-
Goh, W.1
Leong, P.C.2
Yeo, C.K.3
-
11
-
-
79960762481
-
Trusted platform module as an enabler for security in cloud computing
-
may
-
M. Achemlal, S. Gharout, and C. Gaber, "Trusted platform module as an enabler for security in cloud computing, " in Network and Information Systems Security (SAR-SSI), 2011 Conference on, pp. 1-6, may 2011.
-
(2011)
Network and Information Systems Security (SAR-SSI), 2011 Conference on
, pp. 1-6
-
-
Achemlal, M.1
Gharout, S.2
Gaber, C.3
-
12
-
-
84875618191
-
How the dataweb can support cloud federation: Service representation and secure data exchange
-
A. Celesti, F. Tusa, M. Villari, and A. Puliafito, "How the dataweb can support cloud federation: Service representation and secure data exchange, " in 2012 Second Symposium on Network Cloud Computing and Applications (NCCA), pp. 73-79, 2012.
-
(2012)
2012 Second Symposium on Network Cloud Computing and Applications (NCCA)
, pp. 73-79
-
-
Celesti, A.1
Tusa, F.2
Villari, M.3
Puliafito, A.4
-
13
-
-
78149334865
-
The out-of-band virtualization model of network storage based on trusted computing
-
aug.
-
Z. Qiang, C. Dong, W. Yunlong, and D. Zhuang, "The out-of-band virtualization model of network storage based on trusted computing, " in Natural Computation (ICNC), 2010 Sixth International Conference on, Vol. 8, pp. 4354-4357, aug. 2010.
-
(2010)
Natural Computation (ICNC), 2010 Sixth International Conference on
, vol.8
, pp. 4354-4357
-
-
Qiang, Z.1
Dong, C.2
Yunlong, W.3
Zhuang, D.4
-
14
-
-
77954488973
-
Research on the security of storage virtualization based on trusted computing
-
may
-
Z. Qiang, W. Yunlong, C. Dong, and D. Zhuang, "Research on the security of storage virtualization based on trusted computing, " in Networking and Digital Society (ICNDS), 2010 2nd International Conference on, Vol. 2, pp. 237-240, may 2010.
-
(2010)
Networking and Digital Society (ICNDS), 2010 2nd International Conference on
, vol.2
, pp. 237-240
-
-
Qiang, Z.1
Yunlong, W.2
Dong, C.3
Zhuang, D.4
-
17
-
-
83455220824
-
A monitoring and audit logging architecture for data location compliance in federated cloud infrastructures
-
P. Massonet, S. Naqvi, C. Ponsard, J. Latanicki, B. Rochwerger, and M. Villari, "A monitoring and audit logging architecture for data location compliance in federated cloud infrastructures, " in IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum, pp. 1510-1517, 2011.
-
(2011)
IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum
, pp. 1510-1517
-
-
Massonet, P.1
Naqvi, S.2
Ponsard, C.3
Latanicki, J.4
Rochwerger, B.5
Villari, M.6
-
18
-
-
79960762481
-
Trusted platform module as an enabler for security in cloud computing
-
M. Achemlal, S. Gharout, and C. Gaber, "Trusted platform module as an enabler for security in cloud computing, " in Network and Information Systems Security Conference, pp. 1-6, 2011.
-
(2011)
Network and Information Systems Security Conference
, pp. 1-6
-
-
Achemlal, M.1
Gharout, S.2
Gaber, C.3
-
19
-
-
84910156435
-
Vtpm: Virtualizing the trusted platform module
-
S. Berger, R. Caceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn, "vtpm: virtualizing the trusted platform module, " in Proceedings of the 15th conference on USENIX Security Symposium, Vol. 15, pp. 1 -6, 2006.
-
(2006)
Proceedings of the 15th Conference on USENIX Security Symposium
, vol.15
, pp. 1-6
-
-
Berger, S.1
Caceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
20
-
-
58049137106
-
Palm: Security preserving vm live migration for systems with vmm-enforced protection
-
oct
-
F. Zhang, Y. Huang, H. Wang, H. Chen, and B. Zang, "Palm: Security preserving vm live migration for systems with vmm-enforced protection, " in Trusted Infrastructure Technologies Conference, 2008. APTC '08. Third Asia-Pacific, pp. 9-18, oct. 2008.
-
(2008)
Trusted Infrastructure Technologies Conference, 2008. APTC '08. Third Asia-Pacific
, pp. 9-18
-
-
Zhang, F.1
Huang, Y.2
Wang, H.3
Chen, H.4
Zang, B.5
-
21
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, "Terra: a virtual machine-based platform for trusted computing, " in Proceedings of SOSP, pp. 193-206, 2003.
-
(2003)
Proceedings of SOSP
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
22
-
-
77957263904
-
The security of cloud computing system enabled by trusted computing technology
-
july
-
Z. Shen and Q. Tong, "The security of cloud computing system enabled by trusted computing technology, " in Signal Processing Systems (ICSPS), 2010 2nd International Conference on, Vol. 2, pp. V2-11-V2-15, july 2010.
-
(2010)
Signal Processing Systems (ICSPS), 2010 2nd International Conference on
, vol.2
-
-
Shen, Z.1
Tong, Q.2
|