-
2
-
-
77957936026
-
-
Google App Engine, http://code.google.com/appengine/, 2013
-
(2013)
Google App Engine
-
-
-
3
-
-
84888000734
-
-
Software as a Service, http://en.wikipedia.org/wiki/Software as a Service, 2013.
-
(2013)
Software As A Service
-
-
-
4
-
-
84894519251
-
-
Addison-Wesley Professional
-
G. Alonso, F. Casati, H. Kuno, and V. Machiraju, Web Services Concepts, Architectures and Applications (Data-Centric Systems and Applications). Addison-Wesley Professional, 2002.
-
(2002)
Architectures and Applications (Data-Centric Systems and Applications)
-
-
Alonso, G.1
Casati, F.2
Kuno, H.3
Machiraju, V.4
Services Concepts, W.5
-
6
-
-
1542595336
-
STREAM: The stanford stream data manager
-
Mar.
-
T.S. Group, "STREAM: The Stanford Stream Data Manager, " IEEE Data Eng. Bull., vol. 26, no. 1, pp. 19-26, Mar. 2003.
-
(2003)
IEEE Data Eng. Bull.
, vol.26
, Issue.1
, pp. 19-26
-
-
Group, T.S.1
-
9
-
-
54049153566
-
TVDc: Managing security in the trusted virtual datacenter
-
S. Berger et al., "TVDc: Managing Security in the Trusted Virtual Datacenter, " ACM SIGOPS Operating Systems Rev., vol. 42, no. 1, pp. 40-47, 2008.
-
(2008)
ACM SIGOPS Operating Systems Rev.
, vol.42
, Issue.1
, pp. 40-47
-
-
Berger, S.1
-
10
-
-
74049152260
-
Hey, you get off my cloud! exploring information leakage in third-party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, You Get Off My Cloud! Exploring Information Leakage in Third-Party Compute Clouds, " Proc. 16th ACM Conf. Computer and Communications Security (CCS), 2009.
-
(2009)
Proc. 16th ACM Conf. Computer and Communications Security (CCS)
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
11
-
-
38949158735
-
A framework for building privacy-conscious composite web services
-
Sept.
-
W. Xu, V.N. Venkatakrishnan, R. Sekar, and I.V. Ramakrishnan, "A Framework for Building Privacy-Conscious Composite Web Services, " Proc. IEEE Int'l Conf. Web Services, pp. 655-662, Sept. 2006.
-
(2006)
Proc. IEEE Int'l Conf. Web Services
, pp. 655-662
-
-
Xu, W.1
Venkatakrishnan, V.N.2
Sekar, R.3
Ramakrishnan, I.V.4
-
12
-
-
4544228476
-
Towards standardized web services privacy technologies
-
June
-
P.C.K. Hung, E. Ferrari, and B. Carminati, "Towards Standardized Web Services Privacy Technologies, " IEEE Int'l Conf. Web Services, pp. 174-183, June 2004.
-
(2004)
IEEE Int'l Conf. Web Services
, pp. 174-183
-
-
Hung, P.C.K.1
Ferrari, E.2
Carminati, B.3
-
13
-
-
4744365297
-
Managing and securing web services with vpns
-
June
-
L. Alchaal, V. Roca, and M. Habert, "Managing and Securing Web Services with VPNs, " Proc. IEEE Int'l Conf. Web Services, pp. 236-243, June 2004.
-
(2004)
Proc. IEEE Int'l Conf. Web Services
, pp. 236-243
-
-
Alchaal, L.1
Roca, V.2
Habert, M.3
-
14
-
-
46849084983
-
Service-oriented virtual private networks for grid applications
-
July
-
H. Zhang, M. Savoie, S. Campbell, S. Figuerola, G. von Bochmann, and B.S. Arnaud, "Service-Oriented Virtual Private Networks for Grid Applications, " Proc. IEEE Int'l Conf. Web Services, pp. 944-951, July 2007.
-
(2007)
Proc. IEEE Int'l Conf. Web Services
, pp. 944-951
-
-
Zhang, H.1
Savoie, M.2
Campbell, S.3
Figuerola, S.4
Von Bochmann, G.5
Arnaud, B.S.6
-
19
-
-
84885617227
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla, "Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems, " Proc. 20th ACM Symp. Operating Systems Principles (SOSP), Oct. 2005.
-
(2005)
Proc. 20th ACM Symp. Operating Systems Principles (SOSP), Oct.
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
Van Doorn, L.5
Khosla, P.6
-
21
-
-
84894520304
-
-
Trusted Computing Group, https://www.trustedcomputing group.org/home, 2013.
-
(2013)
Trusted Computing Group
-
-
-
22
-
-
84894561597
-
-
TPM
-
"TPM Specifications Version 1.2, " TPM, https://www. trustedcomputinggroup.org/downloads/specifications/tpm/tpm, 2013.
-
(2013)
TPM Specifications Version 1.2
-
-
-
23
-
-
34250717227
-
Trusted virtual domains: Toward secure distributed services
-
June
-
J.L. Griffin, T. Jaeger, R. Perez, and R. Sailer, "Trusted Virtual Domains: Toward Secure Distributed Services, " Proc. First Workshop Hot Topics in System Dependability, June 2005.
-
(2005)
Proc. First Workshop Hot Topics in System Dependability
-
-
Griffin, J.L.1
Jaeger, T.2
Perez, R.3
Sailer, R.4
-
24
-
-
84976699318
-
The byzantine generals problem
-
L. Lamport, R. Shostak, and M. Pease, "The Byzantine Generals Problem, " ACM Trans. Programming Languages and Systems, vol. 4, no. 3, pp. 382-401, 1982.
-
(1982)
ACM Trans. Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
25
-
-
5044242517
-
Byzantine modification detection in multicast networks using randomized network coding
-
T. Ho et al., "Byzantine Modification Detection in Multicast Networks Using Randomized Network Coding, " Proc. IEEE Int'l Symp. Information Theory (ISIT), 2004.
-
(2004)
Proc. IEEE Int'l Symp. Information Theory (ISIT)
-
-
Ho, T.1
-
26
-
-
77954472711
-
Runtest: Assuring integrity of dataflow processing in cloud computing infrastructures
-
J. Du, W. Wei, X. Gu, and T. Yu, "Runtest: Assuring Integrity of Dataflow Processing in Cloud Computing Infrastructures, " Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), 2010.
-
(2010)
Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS)
-
-
Du, J.1
Wei, W.2
Gu, X.3
Yu, T.4
-
30
-
-
34250621863
-
Design, implementation, and evaluation of the linear road benchmark on the stream processing core
-
N. Jain et al., "Design, Implementation, and Evaluation of the Linear Road Benchmark on the Stream Processing Core, " Proc. ACM SIGMOD Int'l Conf. Management of Data (SIGMOD '06), 2006.
-
(2006)
Proc. ACM SIGMOD Int'l Conf. Management of Data (SIGMOD '06)
-
-
Jain, N.1
-
31
-
-
12744279471
-
The sahara model for service composition across multiple providers
-
Aug.
-
B. Raman et al., "The SAHARA Model for Service Composition Across Multiple Providers, " Proc. First Int'l Conf. Pervasive Computing, Aug. 2002.
-
(2002)
Proc. First Int'l Conf. Pervasive Computing
-
-
Raman, B.1
-
33
-
-
85011101226
-
Challenges and experience in prototyping a multi-modal stream analytic and monitoring application on system s
-
K.-L. Wu, P.S. Yu, B. Gedik, K. Hildrum, C.C. Aggarwal, E. Bouillet, W. Fan, D. George, X. Gu, G. Luo, and H. Wang, "Challenges and Experience in Prototyping a Multi-Modal Stream Analytic and Monitoring Application on System S, " Proc. 33rd Int'l Conf. Very Large Data Bases (VLDB), pp. 1185-1196, 2007.
-
(2007)
Proc. 33rd Int'l Conf. Very Large Data Bases (VLDB
, pp. 1185-1196
-
-
Wu, K.-L.1
Yu, P.S.2
Gedik, B.3
Hildrum, K.4
Aggarwal, C.C.5
Bouillet, E.6
Fan, W.7
George, D.8
Gu, X.9
Luo, G.10
Wang, H.11
-
35
-
-
34548041192
-
Dryad: Distributed data-parallel programs from sequential building blocks
-
M. Isard, M. Budiu, Y. Yu, A. Birrell, and D. Fetterly, "Dryad: Distributed Data-Parallel Programs from Sequential Building Blocks, " Proc. European Conf. Computer Systems (EuroSys), 2007.
-
(2007)
Proc. European Conf. Computer Systems (EuroSys)
-
-
Isard, M.1
Budiu, M.2
Yu, Y.3
Birrell, A.4
Fetterly, D.5
-
36
-
-
3042738543
-
SWATT: Software-based attestation for embedded devices
-
A. Seshadri, A. Perrig, L.V. Doorn, and P. Khosla, "SWATT: Software-Based Attestation for Embedded Devices, " Proc. IEEE Symp. Security and Privacy, May 2004.
-
(2004)
Proc. IEEE Symp. Security and Privacy, May
-
-
Seshadri, A.1
Perrig, A.2
Doorn, L.V.3
Khosla, P.4
-
38
-
-
78650003017
-
On verifying stateful dataflow processing services in large-scale cloud systems
-
J. Du, X. Gu, and T. Yu, "On Verifying Stateful Dataflow Processing Services in Large-Scale Cloud Systems, " Proc. ACM Conf. Computer and Communications Security (CCS), pp. 672-674, 2010.
-
(2010)
Proc. ACM Conf. Computer and Communications Security (CCS
, pp. 672-674
-
-
Du, J.1
Gu, X.2
Yu, T.3
-
39
-
-
77951880498
-
A survey of fault detection, isolation, and reconfiguration methods
-
May
-
I. Hwang, "A Survey of Fault Detection, Isolation, and Reconfiguration Methods, " IEEE Trans. Control System Technology, vol. 18, no. 3, pp. 636-653, May 2010.
-
(2010)
IEEE Trans. Control System Technology
, vol.18
, Issue.3
, pp. 636-653
-
-
Hwang, I.1
|