메뉴 건너뛰기




Volumn 9081, Issue , 2015, Pages 143-157

Model-based quantitative security analysis of mobile offloading systems under timing attacks

Author keywords

Mobile offloading; Quantitative analysis; Security attributes; Semi Markov process

Indexed keywords

CHEMICAL ANALYSIS; COMPLEX NETWORKS; ECONOMIC AND SOCIAL EFFECTS; ENERGY EFFICIENCY; HARDWARE SECURITY; MARKOV PROCESSES; MOBILE DEVICES; RANDOM PROCESSES; SIDE CHANNEL ATTACK; STOCHASTIC SYSTEMS;

EID: 84937419268     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-18579-8_11     Document Type: Conference Paper
Times cited : (8)

References (21)
  • 1
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34(1), 1–11 (2011)
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 13
    • 79951833702 scopus 로고    scopus 로고
    • Automatically deriving information-theoretic bounds for adaptive side-channel attacks
    • Köpf, B., Basin, D.: Automatically deriving information-theoretic bounds for adaptive side-channel attacks. Journal of Computer Security 19(1), 1–31 (2011)
    • (2011) Journal of Computer Security , vol.19 , Issue.1 , pp. 1-31
    • Köpf, B.1    Basin, D.2
  • 14
    • 80052996390 scopus 로고    scopus 로고
    • Remote timing attacks are still practical
    • In: Atluri, V., Diaz, C. (eds.), Springer, Heidelberg
    • Brumley, B.B., Tuveri, N.: Remote timing attacks are still practical. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 355–371. Springer, Heidelberg (2011)
    • (2011) ESORICS 2011. LNCS , vol.6879 , pp. 355-371
    • Brumley, B.B.1    Tuveri, N.2
  • 15
    • 18844454571 scopus 로고    scopus 로고
    • Remote timing attacks are practical
    • Brumley, D., Boneh, D.: Remote timing attacks are practical. Computer Networks 48(5), 701–716 (2005)
    • (2005) Computer Networks , vol.48 , Issue.5 , pp. 701-716
    • Brumley, D.1    Boneh, D.2
  • 16
    • 84865833121 scopus 로고    scopus 로고
    • A cache timing attack on aes in virtualization environments
    • In: Keromytis, Angelos D. (ed.), Springer, Heidelberg
    • Weiß, Michael, Heinz, Benedikt, Stumpf, Frederic: A cache timing attack on aes in virtualization environments. In: Keromytis, Angelos D. (ed.) FC 2012. LNCS, vol. 7397, pp. 314–328. Springer, Heidelberg (2012)
    • (2012) FC 2012. LNCS , vol.7397 , pp. 314-328
    • Weiß, M.1    Heinz, B.2    Stumpf, F.3
  • 21
    • 84914179040 scopus 로고    scopus 로고
    • Sensitivity analysis of a hierarchical model of mobile cloud computing
    • Special Issue on Resource Management in Mobile Clouds
    • Matos, R., Araujo, J., Oliveira, D., Maciel, P., Trivedi, K.: Sensitivity analysis of a hierarchical model of mobile cloud computing. Simulation Modelling Practice and Theory 50, 151–164 (2015). Special Issue on Resource Management in Mobile Clouds
    • (2015) Simulation Modelling Practice and Theory , vol.50 , pp. 151-164
    • Matos, R.1    Araujo, J.2    Oliveira, D.3    Maciel, P.4    Trivedi, K.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.