-
1
-
-
84893359275
-
-
Trusted Computing Group. http://www.trustedcomputinggroup.org/.
-
-
-
-
2
-
-
9144246153
-
Performance debugging for distributed systems of black boxes
-
M. K. Aguilera, J. C. Mogul, J. L. Wiener, P. Reynolds, and A. Muthitacharoen. Performance debugging for distributed systems of black boxes. In Proc. SOSP, 2003.
-
(2003)
Proc. SOSP
-
-
Aguilera, M.K.1
Mogul, J.C.2
Wiener, J.L.3
Reynolds, P.4
Muthitacharoen, A.5
-
3
-
-
79960598786
-
SmartRE: An architecture for coordinated network-wide redundancy elimination
-
A. Anand, V. Sekar, and A. Akella. SmartRE: an architecture for coordinated network-wide redundancy elimination. In Proc. SIGCOMM, 2009.
-
(2009)
Proc. SIGCOMM
-
-
Anand, A.1
Sekar, V.2
Akella, A.3
-
5
-
-
82155187185
-
CloudNaaS: A cloud networking platform for enterprise applications
-
T. Benson, A. Akella, A. Shaikh, and S. Sahu. CloudNaaS: a cloud networking platform for enterprise applications. In Proc. SOCC, 2011.
-
(2011)
Proc. SOCC
-
-
Benson, T.1
Akella, A.2
Shaikh, A.3
Sahu, S.4
-
6
-
-
54049153566
-
TVDc: Managing security in the trusted virtual datacenter
-
Jan.
-
S. Berger, R. Cáceres, D. Pendarakis, R. Sailer, E. Valdez, R. Perez, W. Schildhauer, and D. Srinivasan. TVDc: managing security in the trusted virtual datacenter. SIGOPS Oper. Syst. Rev., 42(1):40-47, Jan. 2008.
-
(2008)
SIGOPS Oper. Syst. Rev.
, vol.42
, Issue.1
, pp. 40-47
-
-
Berger, S.1
Cáceres, R.2
Pendarakis, D.3
Sailer, R.4
Valdez, E.5
Perez, R.6
Schildhauer, W.7
Srinivasan, D.8
-
7
-
-
84875866777
-
Towards verifiable resource accounting for outsourced computation
-
C. Chen, P. Maniatis, A. Perrig, A. Vasudevan, and V. Sekar. Towards verifiable resource accounting for outsourced computation. In Proc. VEE, 2013.
-
(2013)
Proc. VEE
-
-
Chen, C.1
Maniatis, P.2
Perrig, A.3
Vasudevan, A.4
Sekar, V.5
-
8
-
-
84905844205
-
PacketCloud: An open platform for elastic in-network services
-
Y. Chen, B. Liu, Y. Chen, A. Li, X. Yang, and J. Bi. PacketCloud: an open platform for elastic in-network services. In Proc. MobiArch, 2013.
-
(2013)
Proc. MobiArch
-
-
Chen, Y.1
Liu, B.2
Chen, Y.3
Li, A.4
Yang, X.5
Bi, J.6
-
9
-
-
84883469564
-
Network functions virtualisation: An introduction, benefits, enablers, challenges and call for action
-
M. Chiosi et al. Network functions virtualisation: An introduction, benefits, enablers, challenges and call for action. Technical report, ETSI, 2012.
-
(2012)
Technical Report, ETSI
-
-
Chiosi, M.1
-
10
-
-
79960477230
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina. Controlling data in the cloud: outsourcing computation without outsourcing control. In Proc. CCSW, 2009.
-
(2009)
Proc. CCSW
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
11
-
-
85080713142
-
Toward online verification of client behavior in distributed applications
-
R. A. Cochran and M. K. Reiter. Toward online verification of client behavior in distributed applications. In Proc. NDSS, 2013.
-
(2013)
Proc. NDSS
-
-
Cochran, R.A.1
Reiter, M.K.2
-
12
-
-
79957511284
-
Principles of remote attestation
-
G. Coker, J. Guttman, P. Loscocco, A. Herzog, J. Millen, B. OHanlon, J. Ramsdell, A. Segall, J. Sheehy, and B. Sniffen. Principles of remote attestation. International Journal of Information Security, 10(2):63-81, 2011.
-
(2011)
International Journal of Information Security
, vol.10
, Issue.2
, pp. 63-81
-
-
Coker, G.1
Guttman, J.2
Loscocco, P.3
Herzog, A.4
Millen, J.5
Ohanlon, B.6
Ramsdell, J.7
Segall, A.8
Sheehy, J.9
Sniffen, B.10
-
13
-
-
0035360861
-
Trajectory sampling for direct traffic observation
-
June
-
N. G. Duffield and M. Grossglauser. Trajectory sampling for direct traffic observation. IEEE/ACM Trans. Netw., 9(3):280-292, June 2001.
-
(2001)
IEEE/ACM Trans. Netw.
, vol.9
, Issue.3
, pp. 280-292
-
-
Duffield, N.G.1
Grossglauser, M.2
-
14
-
-
84883696109
-
FlowTags: Enforcing network-wide policies in the presence of dynamic middlebox actions
-
S. K. Fayazbakhsh, V. Sekar, M. Yu, and J. C. Mogul. FlowTags: enforcing network-wide policies in the presence of dynamic middlebox actions. In Proc. HotSDN, 2013.
-
(2013)
Proc. HotSDN
-
-
Fayazbakhsh, S.K.1
Sekar, V.2
Yu, M.3
Mogul, J.C.4
-
15
-
-
80052989662
-
X-trace: A pervasive network tracing framework
-
R. Fonseca, G. Porter, R. H. Katz, S. Shenker, and I. Stoica. X-Trace: a pervasive network tracing framework. In Proc. NSDI, 2007.
-
(2007)
Proc. NSDI
-
-
Fonseca, R.1
Porter, G.2
Katz, R.H.3
Shenker, S.4
Stoica, I.5
-
22
-
-
84893399822
-
Verifying and enforcing network paths with ICING
-
J. Naous, M. Walfish, A. Nicolosi, D. Mazières, M. Miller, and A. Seehra. Verifying and enforcing network paths with ICING. In Proc. CoNext, 2011.
-
(2011)
Proc. CoNext
-
-
Naous, J.1
Walfish, M.2
Nicolosi, A.3
Mazières, D.4
Miller, M.5
Seehra, A.6
-
25
-
-
84880861749
-
Verifiable resource accounting for cloud computing services
-
V. Sekar and P. Maniatis. Verifiable resource accounting for cloud computing services. In Proc. CCSW, 2011.
-
(2011)
Proc. CCSW
-
-
Sekar, V.1
Maniatis, P.2
-
26
-
-
84866513406
-
Making middleboxes someone else's problem: Network processing as a cloud service
-
J. Sherry, S. Hasan, C. Scott, A. Krishnamurthy, S. Ratnasamy, and V. Sekar. Making middleboxes someone else's problem: network processing as a cloud service. In Proc. SIGCOMM, 2012.
-
(2012)
Proc. SIGCOMM
-
-
Sherry, J.1
Hasan, S.2
Scott, C.3
Krishnamurthy, A.4
Ratnasamy, S.5
Sekar, V.6
-
28
-
-
84871284967
-
Middleboxes no longer considered harmful
-
M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, and S. Shenker. Middleboxes no longer considered harmful. In Proc. OSDI, 2004.
-
(2004)
Proc. OSDI
-
-
Walfish, M.1
Stribling, J.2
Krohn, M.3
Balakrishnan, H.4
Morris, R.5
Shenker, S.6
-
29
-
-
84893376170
-
Packet-dropping adversary identification for data plane security
-
X. Zhang, A. Jain, and A. Perrig. Packet-dropping adversary identification for data plane security. In Proc. CoNext, 2008.
-
(2008)
Proc. CoNext
-
-
Zhang, X.1
Jain, A.2
Perrig, A.3
|