-
1
-
-
0035455653
-
The anatomy of the grid: Enabling scalable virtual organizations
-
10.1177/109434200101500302
-
Foster I, Kesselman C, Tuecke S (2001) The anatomy of the grid: enabling scalable virtual organizations. Int J High Perform Comput Appl 15:200-222
-
(2001)
Int J High Perform Comput Appl
, vol.15
, pp. 200-222
-
-
Foster, I.1
Kesselman, C.2
Tuecke, S.3
-
2
-
-
68249129760
-
Above the clouds: A Berkeley view of cloud computing
-
University of California at Berkeley
-
Armbrust M, Fox A, Griffith R, Joseph AD, Katz RH, Konwinski A, Lee G (2009) Above the clouds: a Berkeley view of cloud computing. Technical report, Electrical Engineering and Computer Sciences, University of California at Berkeley
-
(2009)
Technical Report, Electrical Engineering and Computer Sciences
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
-
3
-
-
56349150824
-
Market-oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities
-
IEEE Washington
-
Buyya R, Yeo CS, Venugopal S (2008) Market-oriented cloud computing: vision, hype, and reality for delivering IT services as computing utilities. In: 10th IEEE international conference on high performance computing and communications. IEEE, Washington, pp 5-13
-
(2008)
10th IEEE International Conference on High Performance Computing and Communications
, pp. 5-13
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
-
4
-
-
20344383743
-
Virtual machine monitors: Current technology and future trends
-
10.1109/MC.2005.176
-
Rosenblum M, Garfinkel T (2005) Virtual machine monitors: current technology and future trends. IEEE Comput 38:39-47
-
(2005)
IEEE Comput
, vol.38
, pp. 39-47
-
-
Rosenblum, M.1
Garfinkel, T.2
-
5
-
-
20344389520
-
The architecture of virtual machines
-
10.1109/MC.2005.173
-
Smith JE, Nair R (2005) The architecture of virtual machines. IEEE Comput 38:32-38
-
(2005)
IEEE Comput
, vol.38
, pp. 32-38
-
-
Smith, J.E.1
Nair, R.2
-
7
-
-
84944386303
-
When virtual is harder than real: Security challenges in virtual machine based computing environments
-
IEEE Santa Fe
-
Garfinkel T, Rosenblum M (2005) When virtual is harder than real: security challenges in virtual machine based computing environments. In: 10th workshop on hot topics in operating systems. IEEE, Santa Fe, pp 20-25
-
(2005)
10th Workshop on Hot Topics in Operating Systems
, pp. 20-25
-
-
Garfinkel, T.1
Rosenblum, M.2
-
8
-
-
33746307335
-
A hybrid artificial immune and mobile agent intrusion detection based model for computer network operations
-
IEEE Denver 10.1109/IPDPS.2005.33
-
Machado RB, Boukerche A, Sobral JBM, Juca KRL, Notare MSMA (2005) A hybrid artificial immune and mobile agent intrusion detection based model for computer network operations. In: 19th IEEE international parallel and distributed processing symposium. IEEE, Denver, pp 191-198
-
(2005)
19th IEEE International Parallel and Distributed Processing Symposium
, pp. 191-198
-
-
Machado, R.B.1
Boukerche, A.2
Sobral, J.B.M.3
Juca, K.R.L.4
Notare, M.5
-
10
-
-
56449101271
-
Finding corrupted computers using imperfect intrusion prevention system event data
-
5219 10.1007/978-3-540-87698-4-20
-
Chrun D, Cukier M, Sneeringer G (2008) Finding corrupted computers using imperfect intrusion prevention system event data. In: Computer safety reliability, and security, vol 5219, pp 221-234
-
(2008)
Computer Safety Reliability, and Security
, pp. 221-234
-
-
Chrun, D.1
Cukier, M.2
Sneeringer, G.3
-
11
-
-
70349099577
-
VMFence: A customized intrusion prevention system in distributed virtual computing environment
-
ACM Suwon
-
Jin H, Xiang G, Zhao F, Zou D, Li M, Shi L (2009) VMFence: a customized intrusion prevention system in distributed virtual computing environment. In: 3rd international conference on ubiquitous information management and communication. ACM, Suwon
-
(2009)
3rd International Conference on Ubiquitous Information Management and Communication
-
-
Jin, H.1
Xiang, G.2
Zhao, F.3
Zou, D.4
Li, M.5
Shi, L.6
-
12
-
-
21644433634
-
Xen and the art of virtualization
-
ACM New York
-
Barham P, Dragovic B, Fraser K, Harris SHT, Ho A, Neugebauer R, Pratt I, Warfield A (2003) Xen and the art of virtualization. In: 19th ACM symposium on operating systems principles. ACM, New York, pp 164-177
-
(2003)
19th ACM Symposium on Operating Systems Principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Harris, S.H.T.4
Ho, A.5
Neugebauer, R.6
Pratt, I.7
Warfield, A.8
-
13
-
-
34548088028
-
Xen 3.0 and the art of virtualization
-
USENIX Ottawa
-
Pratt I, Fraser K, Hand S, Limpach C, Warfield A, Magenheimer D, Nakajima J, Mallick A (2005) Xen 3.0 and the art of virtualization. In: 2005 Linux symposium. USENIX, Ottawa, pp 65-77
-
(2005)
2005 Linux Symposium
, pp. 65-77
-
-
Pratt, I.1
Fraser, K.2
Hand, S.3
Limpach, C.4
Warfield, A.5
Magenheimer, D.6
Nakajima, J.7
Mallick, A.8
-
15
-
-
0035054933
-
Microprocessors for the new millennium: Challenges, opportunities, and new frontiers
-
ACM San Francisco
-
Gelsinger PP (2001) Microprocessors for the new millennium: challenges, opportunities, and new frontiers. In: 45th international solid state circuits conference. ACM, San Francisco, pp 22-35
-
(2001)
45th International Solid State Circuits Conference
, pp. 22-35
-
-
Gelsinger, P.P.1
-
18
-
-
84978401615
-
Revirt: Enabling intrusion analysis through virtual machine logging and replay
-
USENIX Boston 10.1145/1060289.1060309
-
Dunlap GW, King ST, Cinar S, Basrai M, Chen PM (2002) Revirt: enabling intrusion analysis through virtual machine logging and replay. In: 5th symposium on operating systems design and implementation. USENIX, Boston, pp 211-224
-
(2002)
5th Symposium on Operating Systems Design and Implementation
, pp. 211-224
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.4
Chen, P.M.5
-
19
-
-
85080362568
-
A virtual machine introspection based architecture for intrusion detection
-
IEEE San Diego
-
Garfinkel T, Rosenblum M (2003) A virtual machine introspection based architecture for intrusion detection. In: 10th network and distributed system symposium. IEEE, San Diego, pp 191-206
-
(2003)
10th Network and Distributed System Symposium
, pp. 191-206
-
-
Garfinkel, T.1
Rosenblum, M.2
-
20
-
-
84885639914
-
Detecting past and present intrusions through vulnerability-specific predicates
-
ACM Brighton
-
Joshi A, King ST, Dunlap GW, Chen PM (2005) Detecting past and present intrusions through vulnerability-specific predicates. In: 20th ACM symposium on operating systems principles. ACM, Brighton, pp 1-15
-
(2005)
20th ACM Symposium on Operating Systems Principles
, pp. 1-15
-
-
Joshi, A.1
King, S.T.2
Dunlap, G.W.3
Chen, P.M.4
-
21
-
-
32044466453
-
HyperSpector: Virtual distributed monitoring environments for secure intrusion detection
-
ACM Chicago 10.1145/1064979.1065006
-
Kourai K, Chiba S (2005) HyperSpector: virtual distributed monitoring environments for secure intrusion detection. In: 1st ACM/USENIX international conference on virtual execution environments. ACM, Chicago, pp 197-207
-
(2005)
1st ACM/USENIX International Conference on Virtual Execution Environments
, pp. 197-207
-
-
Kourai, K.1
Chiba, S.2
-
22
-
-
85077741011
-
Storage-based intrusion detection: Watching storage activity for suspicious behavior
-
USENIX Washington
-
Pennington AG, Strunk JD, Griffin JL, Soules CAN, Goodson GR, Ganger GR (2003) Storage-based intrusion detection: watching storage activity for suspicious behavior. In: 12th USENIX security symposium. USENIX, Washington, pp 1-15
-
(2003)
12th USENIX Security Symposium
, pp. 1-15
-
-
Pennington, A.G.1
Strunk, J.D.2
Griffin, J.L.3
Soules, C.A.N.4
Goodson, G.R.5
Ganger, G.R.6
|