-
1
-
-
84878341131
-
Survey cloud monitoring: A survey
-
Aceto, G., Botta, A., De Donato, W., and Pescape, A. (2013). Survey cloud monitoring: A survey. Computer Networks, 57(9):2093-2115.
-
(2013)
Computer Networks
, vol.57
, Issue.9
, pp. 2093-2115
-
-
Aceto, G.1
Botta, A.2
De Donato, W.3
Pescape, A.4
-
2
-
-
84874066699
-
Qos-monaas: A portable architecture for qos monitoring in the cloud
-
Adinolfi, O., Cristaldi, R., Coppolino, L., and Romano, L. (2012). Qos-monaas: A portable architecture for qos monitoring in the cloud. SITIS '12, pages 527-532.
-
(2012)
SITIS '12
, pp. 527-532
-
-
Adinolfi, O.1
Cristaldi, R.2
Coppolino, L.3
Romano, L.4
-
3
-
-
80455144630
-
Security slas for federated cloud services
-
Bernsmed, K., Jaatun, M. G., Meland, P. H., and Undheim, A. (2011). Security slas for federated cloud services. ARES '11, pages 202-209.
-
(2011)
ARES '11
, pp. 202-209
-
-
Bernsmed, K.1
Jaatun, M.G.2
Meland, P.H.3
Undheim, A.4
-
4
-
-
77957810674
-
Overshadow: A virtualizationbased approach to retrofitting protection in commodity operating systems
-
Chen, X., Garfinkel, T., Lewis, E. C., Subrahmanyam, P., Waldspurger, C. A., Boneh, D., Dwoskin, J., and Ports, D. R. (2008). Overshadow: A virtualizationbased approach to retrofitting protection in commodity operating systems. SIGOPS Oper. Syst. Rev., 42(2):2-13.
-
(2008)
SIGOPS Oper. Syst. Rev.
, vol.42
, Issue.2
, pp. 2-13
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.8
-
5
-
-
70349145918
-
Decoupling dynamic program analysis from execution in virtual environments
-
Chow, J., Garfinkel, T., and Chen, P.M. (2008). Decoupling dynamic program analysis from execution in virtual environments. ATC '08, pages 1-14.
-
(2008)
ATC '08
, pp. 1-14
-
-
Chow, J.1
Garfinkel, T.2
Chen, P.M.3
-
6
-
-
77953032795
-
Sla perspective in security management for cloud computing
-
de Chaves, S., Westphall, C., and Lamin, F. (2010). Sla perspective in security management for cloud computing. ICNS '10, pages 212-217.
-
(2010)
ICNS '10
, pp. 212-217
-
-
De Chaves, S.1
Westphall, C.2
Lamin, F.3
-
7
-
-
84978401615
-
Revirt: Enabling intrusion analysis through virtual-machine logging and replay
-
Dunlap, G. W., King, S. T., Cinar, S., Basrai, M. A., and Chen, P. M. (2002). Revirt: Enabling intrusion analysis through virtual-machine logging and replay. SIGOPS Oper. Syst. Rev., 36(SI):211-224.
-
(2002)
SIGOPS Oper. Syst. Rev.
, vol.36
, Issue.1
, pp. 211-224
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.A.4
Chen, P.M.5
-
8
-
-
77956957766
-
Low level metrics to high level slas - lom2his framework: Bridging the gap between monitored metrics and sla parameters in cloud environments
-
Emeakaroha, V., Brandic, I., Maurer, M., and Dustdar, S. (2010). Low level metrics to high level slas - lom2his framework: Bridging the gap between monitored metrics and sla parameters in cloud environments. HPCS '10, pages 48-54.
-
(2010)
HPCS '10
, pp. 48-54
-
-
Emeakaroha, V.1
Brandic, I.2
Maurer, M.3
Dustdar, S.4
-
9
-
-
84870849331
-
Casvid: Application level monitoring for sla violation detection in clouds
-
Emeakaroha, V., Ferreto, T., Netto, M., Brandic, I., and De Rose, C. (2012). Casvid: Application level monitoring for sla violation detection in clouds. COMPSAC '12, pages 499-508.
-
(2012)
COMPSAC '12
, pp. 499-508
-
-
Emeakaroha, V.1
Ferreto, T.2
Netto, M.3
Brandic, I.4
De Rose, C.5
-
10
-
-
85080362568
-
A virtual machine introspection based architecture for intrusion detection
-
Garfinkel, T. and Rosenblum, M. (2003). A virtual machine introspection based architecture for intrusion detection. NDSS'03, pages 191-206.
-
(2003)
NDSS'03
, pp. 191-206
-
-
Garfinkel, T.1
Rosenblum, M.2
-
12
-
-
81055155507
-
Cloudsec: A securitymonitoring appliance for virtual machines in the iaas cloud model
-
Ibrahim, A., Hamlyn-Harris, J., Grundy, J., and Almorsy, M. (2011). Cloudsec: A securitymonitoring appliance for virtual machines in the iaas cloud model. NSS '11, pages 113-120.
-
(2011)
NSS '11
, pp. 113-120
-
-
Ibrahim, A.1
Hamlyn-Harris, J.2
Grundy, J.3
Almorsy, M.4
-
13
-
-
77950853188
-
Stealthy malware detection through vmm-based out-of-The-box semantic view reconstruction
-
Jiang, X., Wang, X., and Xu, D. (2007). Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. CCS '07, pages 128- 138.
-
(2007)
CCS '07
, pp. 128-138
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
14
-
-
77952336652
-
Vmm-based hidden process detection and identification using lycosid
-
Jones, S. T., Arpaci-Dusseau, A. C., and Arpaci-Dusseau, R. H. (2008). Vmm-based hidden process detection and identification using lycosid. VEE '08, pages 91- 100.
-
(2008)
VEE '08
, pp. 91-100
-
-
Jones, S.T.1
Arpaci-Dusseau, A.C.2
Arpaci-Dusseau, R.H.3
-
15
-
-
84893543049
-
K-tracer: A system for extracting kernel malware behavior
-
Lanzi, A., Sharif, M. I., and Lee, W. (2009). K-tracer: A system for extracting kernel malware behavior. NDSS'09.
-
(2009)
NDSS'09
-
-
Lanzi, A.1
Sharif, M.I.2
Lee, W.3
-
16
-
-
72949120122
-
Kvmsec: A security extension for linux kernel virtual machines
-
Lombardi, F. and Di Pietro, R. (2009). Kvmsec: A security extension for linux kernel virtual machines. SAC '09, pages 2029-2034.
-
(2009)
SAC '09
, pp. 2029-2034
-
-
Lombardi, F.1
Di Pietro, R.2
-
17
-
-
77955186544
-
Trustvisor: Efficient tcb reduction and attestation
-
McCune, J., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V., and Perrig, A. (2010). Trustvisor: Efficient tcb reduction and attestation. SP '10, pages 143-158.
-
(2010)
SP '10
, pp. 143-158
-
-
McCune, J.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
18
-
-
77950831023
-
Mavmm: Lightweight and purpose built vmm for malware analysis
-
Nguyen, A., Schear, N., Jung, H., Godiyal, A., King, S., and Nguyen, H. (2009). Mavmm: Lightweight and purpose built vmm for malware analysis. ACSAC '09, pages 441-450.
-
(2009)
ACSAC '09
, pp. 441-450
-
-
Nguyen, A.1
Schear, N.2
Jung, H.3
Godiyal, A.4
King, S.5
Nguyen, H.6
-
19
-
-
84902350582
-
D2.1: Security-aware sla specification language and cloud security dependency model
-
Pannetrat, A., Hogben, G., Katopodis, S., Spanoudakis, G., and Cazorla, C. S. (2013). D2.1: Security-aware sla specification language and cloud security dependency model. Technical report, Certification infrastrUcture for MUlti-Layer cloUd Services (CUMULUS).
-
(2013)
Technical Report, Certification InfrastrUcture for MUlti-Layer CloUd Services (CUMULUS)
-
-
Pannetrat, A.1
Hogben, G.2
Katopodis, S.3
Spanoudakis, G.4
Cazorla, C.S.5
-
20
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
Payne, B., Carbone, M., Sharif, M., and Lee, W. (2008). Lares: An architecture for secure active monitoring using virtualization. SP '08, pages 233-247.
-
(2008)
SP '08
, pp. 233-247
-
-
Payne, B.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
21
-
-
84926426273
-
Experiences in building a mosaic of clouds
-
Petcu, D., Di Martino, B., Venticinque, S., Rak, M., Mahr, T., Esnal Lopez, G., Brito, F., Cossu, R., Stopar, M., Sperka, S., and Stankovski, V. Experiences in building a mosaic of clouds. Journal of Cloud Computing: Advances, Systems and Applications, 2:12.
-
Journal of Cloud Computing: Advances, Systems and Applications
, vol.2
, pp. 12
-
-
Petcu, D.1
Di Martino, B.2
Venticinque, S.3
Rak, M.4
Mahr, T.5
Esnal Lopez, G.6
Brito, F.7
Cossu, R.8
Stopar, M.9
Sperka, S.10
Stankovski, V.11
-
22
-
-
84899752948
-
Security as a service using an SLA-based approach via SPECS
-
Rak, M., Luna, J., Petcu, D., Casola, V., Suri, N., and Villano, U. (2013). Security as a service using an SLA-based approach via SPECS. Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom 13.
-
(2013)
Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom
, vol.2
, pp. 1-6
-
-
Rak, M.1
Luna, J.2
Petcu, D.3
Casola, V.4
Suri, N.5
Villano, U.6
-
23
-
-
84857173913
-
Cloud application monitoring: The mosaic approach
-
Rak, M., Venticinque, S., Mahr, T., Echevarria, G., and Esnal, G. (2011). Cloud application monitoring: The mosaic approach. CloudCom '11, pages 758-763.
-
(2011)
CloudCom '11
, pp. 758-763
-
-
Rak, M.1
Venticinque, S.2
Mahr, T.3
Echevarria, G.4
Esnal, G.5
-
24
-
-
56549083677
-
Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing
-
Riley, R., Jiang, X., and Xu, D. (2008). Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing. RAID '08, pages 1-20.
-
(2008)
RAID '08
, pp. 1-20
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
25
-
-
70349128844
-
Multi-aspect profiling of kernel rootkit behavior
-
Riley, R., Jiang, X., and Xu, D. (2009). Multi-aspect profiling of kernel rootkit behavior. EuroSys '09, pages 47-60.
-
(2009)
EuroSys '09
, pp. 47-60
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
26
-
-
41149103393
-
Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
-
Seshadri, A., Luk, M., Qu, N., and Perrig, A. (2007). Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses. SOSP '07, pages 335- 350.
-
(2007)
SOSP '07
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
27
-
-
74049145643
-
Secure in-vm monitoring using hardware virtualization
-
Sharif, M. I., Lee, W., Cui, W., and Lanzi, A. (2009). Secure in-vm monitoring using hardware virtualization. CCS '09, pages 477-487.
-
(2009)
CCS '09
, pp. 477-487
-
-
Sharif, M.I.1
Lee, W.2
Cui, W.3
Lanzi, A.4
-
28
-
-
84874562245
-
Cloud watcher: Network security monitoring using open flow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)
-
Shin, S. and Gu, G. (2012). Cloudwatcher: Network security monitoring using openflow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?). ICNP '12, pages 1-6.
-
(2012)
ICNP '12
, pp. 1-6
-
-
Shin, S.1
Gu, G.2
-
29
-
-
84885950922
-
Distributed, application-level monitoring for heterogeneous clouds using stream processing
-
Smit, M., Simmons, B., and Litoiu, M. (2013). Distributed, application-level monitoring for heterogeneous clouds using stream processing. Future Generation Computer Systems, 29(8):2103-2114.
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.8
, pp. 2103-2114
-
-
Smit, M.1
Simmons, B.2
Litoiu, M.3
-
31
-
-
84902350581
-
-
Technical report, Gartner ID:G00245775
-
Wagner, R., Heiser, J., Perkins, E., Nicolett, M., Kavanagh, K. M., Chuvakin, A., and Young, G. (2012). Predicts 2013: Cloud and services security. Technical report, Gartner ID:G00245775.
-
(2012)
Predicts 2013: Cloud and Services Security
-
-
Wagner, R.1
Heiser, J.2
Perkins, E.3
Nicolett, M.4
Kavanagh, K.M.5
Chuvakin, A.6
Young, G.7
-
32
-
-
84877645675
-
Secmon: A secure introspection framework for hardware virtualization
-
Wu, X., Gao, Y., Tian, X., Song, Y., Guo, B., Feng, B., and Sun, Y. (2013). Secmon: A secure introspection framework for hardware virtualization. PDP '13, pages 282-286.
-
(2013)
PDP '13
, pp. 282-286
-
-
Wu, X.1
Gao, Y.2
Tian, X.3
Song, Y.4
Guo, B.5
Feng, B.6
Sun, Y.7
-
33
-
-
76649114635
-
Toward revealing kernel malware behavior in virtual execution environments
-
Xuan, C., Copeland, J., and Beyah, R. (2009). Toward revealing kernel malware behavior in virtual execution environments. RAID '09, pages 304-325.
-
(2009)
RAID '09
, pp. 304-325
-
-
Xuan, C.1
Copeland, J.2
Beyah, R.3
-
34
-
-
84885955735
-
Design and implementation of a trusted monitoring framework for cloud platforms
-
Zou, D., Zhang, W., Qiang, W., Xiang, G., Yang, L. T., Jin, H., and Hu, K. (2013). Design and implementation of a trusted monitoring framework for cloud platforms. Future Generation Computer Systems, 29(8):2092 - 2102.
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.8
, pp. 2092-2102
-
-
Zou, D.1
Zhang, W.2
Qiang, W.3
Xiang, G.4
Yang, L.T.5
Jin, H.6
Hu, K.7
|