-
2
-
-
84890868299
-
-
The 112th US Congress: S. 3569 (112th)
-
The 112th US Congress: Cloud Computing Act of 2012, S. 3569 (112th) (2012)
-
(2012)
Cloud Computing Act of 2012
-
-
-
4
-
-
80955143542
-
All Your Clouds Are Belong to us: Security Analysis of Cloud Management Interfaces
-
ACM, New York
-
Somorovsky, J., Heiderich, M., Jensen, M., Schwenk, J., Gruschka, N., Lo Iacono, L.: All Your Clouds Are Belong to us: Security Analysis of Cloud Management Interfaces. In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security, CCSW 2011, pp. 3-14. ACM, New York (2011)
-
(2011)
Proceedings of the 3rd ACM Workshop on Cloud Computing Security, CCSW 2011
, pp. 3-14
-
-
Somorovsky, J.1
Heiderich, M.2
Jensen, M.3
Schwenk, J.4
Gruschka, N.5
Lo Iacono, L.6
-
5
-
-
74049152260
-
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds
-
ACM, New York
-
Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 199-212. ACM, New York (2009)
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
6
-
-
84868113388
-
Cleaning up dirty disks in the cloud
-
Jordon, M.: Cleaning up dirty disks in the cloud. Network Security 2012(10), 12-15 (2012)
-
(2012)
Network Security
, vol.2012
, Issue.10
, pp. 12-15
-
-
Jordon, M.1
-
9
-
-
21644486314
-
-
Trusted Computing Group: revision 1.4. Technical report, Trusted Computing Group
-
Trusted Computing Group: TCG Specification, Architecture Overview, revision 1.4. Technical report, Trusted Computing Group (2007)
-
(2007)
TCG Specification, Architecture Overview
-
-
-
10
-
-
79961133763
-
Implementing Trust in Cloud Infrastructures
-
May
-
Neisse, R., Holling, D., Pretschner, A.: Implementing Trust in Cloud Infrastructures. In: 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pp. 524-533 (May 2011)
-
(2011)
2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)
, pp. 524-533
-
-
Neisse, R.1
Holling, D.2
Pretschner, A.3
-
11
-
-
56649102115
-
Property-Based TPM Virtualization
-
Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. Springer, Heidelberg
-
Sadeghi, A.-R., Stüble, C., Winandy, M.: Property-Based TPM Virtualization. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 1-16. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5222
, pp. 1-16
-
-
Sadeghi, A.-R.1
Stüble, C.2
Winandy, M.3
-
12
-
-
84855701474
-
Enabling Secure VM-vTPM Migration in Private Clouds
-
ACM, New York
-
Danev, B., Masti, R.J., Karame, G.O., Capkun, S.: Enabling Secure VM-vTPM Migration in Private Clouds. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011, pp. 187-196. ACM, New York (2011)
-
(2011)
Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011
, pp. 187-196
-
-
Danev, B.1
Masti, R.J.2
Karame, G.O.3
Capkun, S.4
-
13
-
-
84929445167
-
Towards Trusted Cloud Computing
-
USENIX Association, Berkeley
-
Santos, N., Gummadi, K.P., Rodrigues, R.: Towards Trusted Cloud Computing. In: Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, HotCloud 2009. USENIX Association, Berkeley (2009)
-
(2009)
Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, HotCloud 2009
-
-
Santos, N.1
Gummadi, K.P.2
Rodrigues, R.3
-
14
-
-
84864878200
-
Securely Launching Virtual Machines on Trustworthy Platforms in a Public Cloud - An Enterprise's Perspective
-
Leymann, F., Ivanov, I., van Sinderen, M., Shan, T. (eds.) SciTePress
-
Aslam, M., Gehrmann, C., Rasmusson, L., Björkman, M.: Securely Launching Virtual Machines on Trustworthy Platforms in a Public Cloud - An Enterprise's Perspective. In: Leymann, F., Ivanov, I., van Sinderen, M., Shan, T. (eds.) CLOSER, pp. 511-521. SciTePress (2012)
-
(2012)
CLOSER
, pp. 511-521
-
-
Aslam, M.1
Gehrmann, C.2
Rasmusson, L.3
Björkman, M.4
-
15
-
-
84868116561
-
Security and Trust Preserving VM Migrations in Public Clouds
-
Aslam, M., Gehrmann, C., Björkman, M.: Security and Trust Preserving VM Migrations in Public Clouds. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). TRUSTCOM, Liverpool (2012)
-
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). TRUSTCOM, Liverpool (2012)
-
-
Aslam, M.1
Gehrmann, C.2
Björkman, M.3
-
16
-
-
84875979259
-
Trusted launch of virtual machine instances in public iaas environments
-
Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. Springer, Heidelberg
-
Paladi, N., Gehrmann, C., Aslam, M., Morenius, F.: Trusted launch of virtual machine instances in public iaas environments. In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. LNCS, vol. 7839, pp. 309-323. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7839
, pp. 309-323
-
-
Paladi, N.1
Gehrmann, C.2
Aslam, M.3
Morenius, F.4
-
18
-
-
84863599761
-
Hypervisor-based background encryption
-
ACM, New York
-
Omote, Y., Chubachi, Y., Shinagawa, T., Kitamura, T., Eiraku, H., Matsubara, K.: Hypervisor-based background encryption. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC 2012, pp. 1829-1836. ACM, New York (2012)
-
(2012)
Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC 2012
, pp. 1829-1836
-
-
Omote, Y.1
Chubachi, Y.2
Shinagawa, T.3
Kitamura, T.4
Eiraku, H.5
Matsubara, K.6
-
19
-
-
21644433634
-
Xen and the art of virtualization
-
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. ACM SIGOPS Operating Systems Review 37(5), 164-177 (2003)
-
(2003)
ACM SIGOPS Operating Systems Review
, vol.37
, Issue.5
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
20
-
-
84858790227
-
Architectural support for secure virtualization under a vulnerable hypervisor
-
ACM
-
Jin, S., Ahn, J., Cha, S., Huh, J.: Architectural support for secure virtualization under a vulnerable hypervisor. In: Proceedings of the 44th Annual IEEE/ACM International Symposium on Microarchitecture, pp. 272-283. ACM (2011)
-
(2011)
Proceedings of the 44th Annual IEEE/ACM International Symposium on Microarchitecture
, pp. 272-283
-
-
Jin, S.1
Ahn, J.2
Cha, S.3
Huh, J.4
-
21
-
-
78650019783
-
Hypersentry: Enabling stealthy in-context measurement of hypervisor integrity
-
ACM
-
Azab, A.M., Ning, P., Wang, Z., Jiang, X., Zhang, X., Skalsky, N.C.: Hypersentry: enabling stealthy in-context measurement of hypervisor integrity. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 38-49. ACM (2010)
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 38-49
-
-
Azab, A.M.1
Ning, P.2
Wang, Z.3
Jiang, X.4
Zhang, X.5
Skalsky, N.C.6
-
22
-
-
77952329878
-
Improving xen security through disaggregation
-
ACM
-
Murray, D.G., Milos, G., Hand, S.: Improving xen security through disaggregation. In: Proceedings of the Fourth ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, pp. 151-160. ACM (2008)
-
(2008)
Proceedings of the Fourth ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments
, pp. 151-160
-
-
Murray, D.G.1
Milos, G.2
Hand, S.3
-
23
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
CSFW-14
-
Blanchet, B., et al.: An efficient cryptographic protocol verifier based on prolog rules. In: 14th IEEE Computer Security Foundations Workshop, CSFW-14 (2001)
-
(2001)
14th IEEE Computer Security Foundations Workshop
-
-
Blanchet, B.1
-
24
-
-
84890872136
-
National vulnerability database taken offline after malware is found on servers
-
Technical report
-
National vulnerability database taken offline after malware is found on servers. Technical report, SANS NewsBites, vol. XV(21) (2013), www.sans.org
-
(2013)
SANS NewsBites
, vol.15
, Issue.21
-
-
-
25
-
-
14844295011
-
Direct anonymous attestation
-
ACM
-
Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 132-145. ACM (2004)
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
26
-
-
84874297528
-
Versatile key management for secure cloud storage
-
Submitted at (11.4)
-
Graf, S., Lang, P., Hohenadel, S., Waldvogel, M.: Versatile key management for secure cloud storage. Submitted at EuroSys 11(11.4), 2012-2013 (2012)
-
(2012)
EuroSys
, vol.11
, pp. 2012-2013
-
-
Graf, S.1
Lang, P.2
Hohenadel, S.3
Waldvogel, M.4
-
27
-
-
0000636954
-
The versakey framework: Versatile group key management
-
Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The versakey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications 17(9), 1614-1631 (1999)
-
(1999)
IEEE Journal on Selected Areas in Communications
, vol.17
, Issue.9
, pp. 1614-1631
-
-
Waldvogel, M.1
Caronni, G.2
Sun, D.3
Weiler, N.4
Plattner, B.5
-
28
-
-
67650079952
-
Bitvisor: A thin hypervisor for enforcing i/o device security
-
ACM
-
Shinagawa, T., Eiraku, H., Tanimoto, K., Omote, K., Hasegawa, S., Horie, T., Hirano, M., Kourai, K., Oyama, Y., Kawai, E., et al.: Bitvisor: a thin hypervisor for enforcing i/o device security. In: Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, pp. 121-130. ACM (2009)
-
(2009)
Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments
, pp. 121-130
-
-
Shinagawa, T.1
Eiraku, H.2
Tanimoto, K.3
Omote, K.4
Hasegawa, S.5
Horie, T.6
Hirano, M.7
Kourai, K.8
Oyama, Y.9
Kawai, E.10
-
29
-
-
84863599761
-
Hypervisor-based background encryption
-
ACM
-
Omote, Y., Chubachi, Y., Shinagawa, T., Kitamura, T., Eiraku, H., Matsubara, K.: Hypervisor-based background encryption. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 1829-1836. ACM (2012)
-
(2012)
Proceedings of the 27th Annual ACM Symposium on Applied Computing
, pp. 1829-1836
-
-
Omote, Y.1
Chubachi, Y.2
Shinagawa, T.3
Kitamura, T.4
Eiraku, H.5
Matsubara, K.6
-
30
-
-
79951490425
-
Tcvisor: A hypervisor level secure storage
-
IEEE
-
Rezaei, M., Moosavi, N., Nemati, H., Azmi, R.: Tcvisor: A hypervisor level secure storage. In: 2010 International Conference for Internet Technology and Secured Transactions (ICITST), pp. 1-9. IEEE (2010)
-
(2010)
2010 International Conference for Internet Technology and Secured Transactions (ICITST)
, pp. 1-9
-
-
Rezaei, M.1
Moosavi, N.2
Nemati, H.3
Azmi, R.4
|