-
1
-
-
84896392115
-
-
Amazon Inc. Amazon Elastic Compute Cloud (Amazon EC2)
-
Amazon Inc. Amazon Elastic Compute Cloud (Amazon EC2). 〈http://aws.amazon.com/ec2/âŒ.
-
-
-
-
2
-
-
21644433634
-
Xen and the art of virtualization
-
Bolton Landing, NY, USA; October 2003
-
Barham, Paul Dragovic, Boris Fraser, Keir Hand, Steven Harris Tim, Ho Alex, et al. Xen and the art of virtualization. In: Proceedings of the nineteenth ACM symposium on operating systems principles. Bolton Landing, NY, USA; October 2003.
-
Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles
-
-
Barham, P.D.1
Boris, F.2
Keir, H.3
Steven, H.T.4
Ho, A.5
-
3
-
-
84910156435
-
VTPM: Virtualizing the trusted platform module
-
Berkeley, CA, USA. USENIX Association
-
Berger S, Caceres, R, Goldman KA, Perez R, Sailer R, Van Doorn L.vTPM: Virtualizing the trusted platform module. In: Proceedings of the 15th USENIX security symposium, Berkeley, CA, USA. USENIX Association; 2006.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
-
-
Berger, S.1
Caceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
4
-
-
0029700344
-
Decentralized trust management. Security and Privacy
-
Oakland, CA, USA: IEEE Computer Society
-
Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. Security and Privacy. In: Proceedings of the IEEE symposium on security and privacy, Oakland, CA, USA: IEEE Computer Society; 1996. p.164-73
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
8
-
-
84896396373
-
-
Flexiant Inc. Flexiscale public cloud
-
Flexiant Inc. Flexiscale public cloud. 〈http://www. flexiant.com/products/flexiscale/âŒ.
-
-
-
-
9
-
-
0033724294
-
Access control meets public key infrastructure, or assigning roles to strangers
-
Washington DC, USA: IEEE Computer Society
-
Herzberg A, Mass Y, Michaeli J, Ravid Y, Naor D. Access control meets public key infrastructure, or assigning roles to strangers. In: Proceedings of the IEEE symposium on security and privacy, Washington DC, USA: IEEE Computer Society; 2000.
-
(2000)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Herzberg, A.1
Mass, Y.2
Michaeli, J.3
Ravid, Y.4
Naor, D.5
-
10
-
-
0030677524
-
A logical language for expressing authorizations
-
Washington, DC, USA: IEEE Computer Society
-
Jajodia S, Samarati P, Subrahmanian VS. A logical language for expressing authorizations. In: SP '97: proceedings of the 1997 IEEE symposium on Security and privacy, Washington, DC, USA: IEEE Computer Society; 1997. p. 31.
-
(1997)
SP '97: Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 31
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
-
13
-
-
0742276097
-
Inside the slammer worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver Inside the slammer worm IEEE Security and Privacy 1 2003 4
-
(2003)
IEEE Security and Privacy
, vol.1
, pp. 4
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
15
-
-
27544444280
-
Dynamic taint analysis: Automatic detection and generation of software exploit attacks
-
February 2005
-
Newsome J, Song D. Dynamic taint analysis: automatic detection and generation of software exploit attacks. In: Proceedings of NDSS; February 2005.
-
Proceedings of NDSS
-
-
Newsome, J.1
Song, D.2
-
16
-
-
70349750047
-
The eucalyptus open-source cloud-computing system
-
Shanghai, China; May 2009
-
Nurmi D, Wolski R, Grzegorczyk C, Obertelli G, Soman S, Youseff L, et al. The eucalyptus open-source cloud-computing system. In: Proceedings of the 9th IEEE/ACM international symposium on cluster computing and the grid, Shanghai, China; May 2009.
-
Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid
-
-
Nurmi, D.1
Wolski, R.2
Grzegorczyk, C.3
Obertelli, G.4
Soman, S.5
Youseff, L.6
-
17
-
-
0016082273
-
Formal requirements for virtualizable 3rd generation architectures
-
G. Popek, and R. Goldberg Formal requirements for virtualizable 3rd generation architectures Communications of the ACM 17 7 1974 412 421
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
, pp. 412-421
-
-
Popek, G.1
Goldberg, R.2
-
20
-
-
78751529749
-
Conficker and beyond: A large-scale empirical study
-
Texas, USA; December 2010
-
Shin Seungwon, Gu Guofei. Conficker and beyond: a large-scale empirical study. In: Proceedings of ACSAC 2010, Texas, USA; December 2010.
-
Proceedings of ACSAC 2010
-
-
Seungwon, S.1
Guofei, G.2
-
22
-
-
80052437079
-
Analysis of a Botnet takeover
-
Brett Stone-Gross, Marco Cova, Bob Gilbert, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Analysis of a Botnet takeover IEEE Security and Privacy 2010
-
(2010)
IEEE Security and Privacy
-
-
Stone-Gross, B.1
Cova, M.2
Gilbert, B.3
Kemmerer, R.4
Kruegel, C.5
Vigna, G.6
-
23
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
S. Subashini, and V. Kavitha A survey on security issues in service delivery models of cloud computing Journal of Network and Computer Applications 34 1 2011 1 11
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
24
-
-
80755169480
-
Eliminating the hypervisor attack surface for a more secure cloud
-
Chicago, USA; October 2011
-
Szefer Jakub, Keller Eric, Lee Ruby B, Rexford Jennifer. Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of the 18th ACM conference on computer and communications security, Chicago, USA; October 2011.
-
Proceedings of the 18th ACM Conference on Computer and Communications Security
-
-
Jakub, S.1
Eric, K.2
Lee Ruby, B.3
Jennifer, R.4
-
25
-
-
84896399814
-
-
TCG. TPM main - part 1 design principles. Version 1.2, revision 103. Trusted Computing Group; July 2007
-
TCG. TPM main - part 1 design principles. Version 1.2, revision 103. Trusted Computing Group; July 2007.
-
-
-
-
27
-
-
84896394762
-
-
Team TR. Rackspace cloud
-
Team TR. Rackspace cloud. 〈http://www.rackspacecloud. com/âŒ.
-
-
-
-
28
-
-
84896392214
-
-
The Nimbus Team. Nimbus project
-
The Nimbus Team. Nimbus project. 〈http://www. nimbusproject.org/âŒ
-
-
-
-
30
-
-
84896393508
-
-
VMI tools
-
VMI tools. 〈https://code.google.com/p/vmitools/ âŒ
-
-
-
-
31
-
-
84896400452
-
-
XenAccess Library
-
XenAccess Library. Available at: 〈http://code.google. com/p/xenaccess/âŒ
-
-
-
|