-
1
-
-
78650158728
-
Determinating timing channels in compute clouds
-
Chicago, Illinois, USA
-
Aviram, A., Hu, S., Ford, B., & Gummadi, R. (2010). Determinating timing channels in compute clouds. Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, Chicago, Illinois, USA.
-
(2010)
Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop
-
-
Aviram, A.1
Hu, S.2
Ford, B.3
Gummadi, R.4
-
2
-
-
21644433634
-
Xen and the art of virtualization
-
Bolton Landing, NY, USA
-
Barham, P.Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., et al. (2003). Xen and the art of virtualization. Proceedings of the nineteenth ACM symposium on Operating systems principles, Bolton Landing, NY, USA.
-
(2003)
Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
-
3
-
-
57849125076
-
Eliciting security requirements through misuse activities
-
September, Turin, Italy
-
Braz, F.A., Fernandez, E. B., & VanHilst, M. (2008, September)Eliciting security requirements through misuse activities. Proceedings of the 2nd Int. Workshop on Secure Systems Methodologies using Patterns (SPattern'08)- in conjunction with the 4th International Conference onTrust, Privacy & Security in Digital Busines(TrustBus'08) (pp. 328-333). Turin, Italy.
-
(2008)
Proceedings of the 2nd Int. Workshop on Secure Systems Methodologies Using Patterns (SPattern'08)- In Conjunction With the 4th International Conference OnTrust, Privacy & Security In Digital Busines(TrustBus'08)
, pp. 328-333
-
-
Braz, F.A.1
Fernandez, E.B.2
Vanhilst, M.3
-
4
-
-
58049137106
-
PALM: Security preserving VM live migration for systems with VMM-enforced protection
-
October
-
Fengzhe, Z., Yijian, H., Huihong, W., Haibo, C., & Binyu, Z. (2008, October). PALM: Security preserving VM live migration for systems with VMM-enforced protection. Third Asia-Pacific Trusted Infrastructure Technologies Conference, APTC '08 (pp. 9-18).
-
(2008)
Third Asia-Pacific Trusted Infrastructure Technologies Conference, APTC '08
, pp. 9-18
-
-
Fengzhe, Z.1
Yijian, H.2
Huihong, W.3
Haibo, C.4
Binyu, Z.5
-
5
-
-
67449104957
-
A pattern language for secure operating system architectures
-
August, Campos do Jordao, Brazil
-
Fernandez, E.B., & Sorgente, T. (2005, August) A pattern language for secure operating system architectures. Proceedings of the 5th Latin American Conference on Pattern Languages of Programs (pp. 68-88). Campos do Jordao, Brazil.
-
(2005)
Proceedings of the 5th Latin American Conference on Pattern Languages of Programs
, pp. 68-88
-
-
Fernandez, E.B.1
Sorgente, T.2
-
6
-
-
70349706065
-
Modeling misuse patterns
-
March, Fukuoka, Japan
-
Fernandez, E.B., Yoshioka, N., & Washizaki, H. (2009, March). Modeling misuse patterns. Proceedings of the 4th International Workshop on Dependability Aspects of Data Warehousing and Mining Applications (DAWAM 2009), in conjunction with the 4th International Conference on Availability, Reliability, and Security (ARES 2009) (pp. 566-571). Fukuoka, Japan.
-
(2009)
Proceedings of the 4th International Workshop on Dependability Aspects of Data Warehousing and Mining Applications (DAWAM 2009), in Conjunction with the 4th International Conference on Availability, Reliability, and Security (ARES 2009)
, pp. 566-571
-
-
Fernandez, E.B.1
Yoshioka, N.2
Washizaki, H.3
-
8
-
-
77952343216
-
Virtualization: A key feature of cloud computing
-
Mumbai, Maharashtra, India
-
Gurav, U., & Shaikh, R. (2010). Virtualization: A key feature of cloud computing. Proceedings of the International Conference and Workshop on Emerging Trends in Technology (pp. 227-229). Mumbai, Maharashtra, India.
-
(2010)
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
, pp. 227-229
-
-
Gurav, U.1
Shaikh, R.2
-
9
-
-
80052566799
-
The dark cloud: Understanding and defending against botnets and stealthy malware
-
Intel Corporation., Retrieved from
-
Intel Corporation. (2009). The dark cloud: Understanding and defending against botnets and stealthy malware. Intel Technology Journal, 13(02). Retrieved from http://www.intel.com/technology/itj/2009/v13i2/ITJ9.2.9-Cloud.htm
-
(2009)
Intel Technology Journal
, vol.13
, Issue.2
-
-
-
10
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
Chicago, Illinois, USA
-
Ristenpart, T., Tromer, E., Shacham, H., & Savage, S. (2009). Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. Proceedings of the 16th ACM Conference on Computer and Communications Security (pp. 199-212). Chicago, Illinois, USA.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
11
-
-
84929445167
-
Towards trusted cloud computing
-
San Diego, CA: USENIX Association
-
Santos, N., Gummadi, K. P., & Rodrigues, R.(2009). Towards trusted cloud computing Proceedings of the 2009 Conference on Hot Topics in Cloud Computing. San Diego, CA: USENIX Association.
-
(2009)
Proceedings of the 2009 Conference on Hot Topics in Cloud Computing
-
-
Santos, N.1
Gummadi, K.P.2
Rodrigues, R.3
-
12
-
-
77954931494
-
Intrusion detection for grid and cloud computing
-
doi:10.1109/MITP.2009.89
-
Vieira, K., Schulter, A., Westphall, C. B., & Westphall, C. M. (2010). Intrusion detection for grid and cloud computing. IT Professional, 38-43. doi:10.1109/MITP.2009.89
-
(2010)
IT Professional
, pp. 38-43
-
-
Vieira, K.1
Schulter, A.2
Westphall, C.B.3
Westphall, C.M.4
-
15
-
-
74049145625
-
Managing security of virtual machine images in a cloud environment
-
Wei, J., Zhang, X., Ammons, G., Bala, V., & Ning, P. (2009). Managing security of virtual machine images in a cloud environment. Proceedings of the 2009 ACM Workshop on Cloud Computing Security (pp. 91-96).
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 91-96
-
-
Wei, J.1
Zhang, X.2
Ammons, G.3
Bala, V.4
Ning, P.5
-
16
-
-
77952181552
-
Cloud computing research and development trend
-
Sanya, Hainan, China
-
Zhang, S., Zhang, S., Chen, X., & Huo, X. (2010). Cloud computing research and development trend. Second International Conference on Future Networks (pp. 93-97). Sanya, Hainan, China.
-
(2010)
Second International Conference on Future Networks
, pp. 93-97
-
-
Zhang, S.1
Zhang, S.2
Chen, X.3
Huo, X.4
|