-
1
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34(1), 1–11 (2011)
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
2
-
-
84878499314
-
A survey of computation offloading for mobile systems
-
Kumar, K., Liu, J., Lu, Y.-H., Bhargava, B.: A survey of computation offloading for mobile systems. Mobile Networks and Applications 18(1), 129–140 (2013)
-
(2013)
Mobile Networks and Applications
, vol.18
, Issue.1
, pp. 129-140
-
-
Kumar, K.1
Liu, J.2
Lu, Y.-H.3
Bhargava, B.4
-
3
-
-
77954993714
-
Maui: Making smartphones last longer with code offload
-
ACM
-
Cuervo, E., Balasubramanian, A., Cho, D.-K., Wolman, A., Saroiu, S., Chandra, R., Bahl, P.: Maui: making smartphones last longer with code offload. In: Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services, pp. 49–62. ACM (2010)
-
(2010)
Proceedings of the 8Th International Conference on Mobile Systems, Applications, and Services
, pp. 49-62
-
-
Cuervo, E.1
Balasubramanian, A.2
Cho, D.-K.3
Wolman, A.4
Saroiu, S.5
Chandra, R.6
Bahl, P.7
-
6
-
-
84866668858
-
Towards secure mobile cloud computing: A survey
-
Khan, A.N., Kiah, M.M., Khan, S.U., Madani, S.A.: Towards secure mobile cloud computing: A survey. Future Generation Computer Systems 29(5), 1278–1299 (2013)
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.5
, pp. 1278-1299
-
-
Khan, A.N.1
Kiah, M.M.2
Khan, S.U.3
Madani, S.A.4
-
7
-
-
84974774507
-
Towards operationalmeasures of computer security
-
Littlewood, B., Brocklehurst, S., Fenton, N., Mellor, P., Page, S., Wright, D., Dobson, J., McDermid, J., Gollmann, D.: Towards operationalmeasures of computer security. Journal of Computer Security 2(2), 211–229 (1993)
-
(1993)
Journal of Computer Security
, vol.2
, Issue.2
, pp. 211-229
-
-
Littlewood, B.1
Brocklehurst, S.2
Fenton, N.3
Mellor, P.4
Page, S.5
Wright, D.6
Dobson, J.7
McDermid, J.8
Gollmann, D.9
-
8
-
-
12344275676
-
Model-based evaluation: From dependability to security
-
Nicol, D.M., Sanders, W.H., Trivedi, K.S.: Model-based evaluation: from dependability to security. IEEE Transactions on Dependable and Secure Computing 1(1), 48–65 (2004)
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 48-65
-
-
Nicol, D.M.1
Sanders, W.H.2
Trivedi, K.S.3
-
9
-
-
84891522105
-
Using network security index system to evaluate network security
-
In: Qi, E., Shen, J., Dou, R. (eds.), Springer, Heidelberg
-
Zhang, J.-F., Liu, F., Zheng, L.-M., Jia, Y., Zou, P.: Using network security index system to evaluate network security. In: Qi, E., Shen, J., Dou, R. (eds.) The 19th International Conference on Industrial Engineering and Engineering Management, pp. 989–1000. Springer, Heidelberg (2013)
-
(2013)
The 19Th International Conference on Industrial Engineering and Engineering Management
, pp. 989-1000
-
-
Zhang, J.-F.1
Liu, F.2
Zheng, L.-M.3
Jia, Y.4
Zou, P.5
-
10
-
-
84881309609
-
Security risk assessment of cloud carrier
-
IEEE
-
Lenkala, S.R., Shetty, S., Xiong, K.: Security risk assessment of cloud carrier. In: 2013 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pp. 442–449. IEEE (2013)
-
(2013)
2013 13Th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (Ccgrid)
, pp. 442-449
-
-
Lenkala, S.R.1
Shetty, S.2
Xiong, K.3
-
11
-
-
84943777863
-
An introduction to timing attacks
-
Springer
-
Rebeiro, C., Mukhopadhyay, D., Bhattacharya, S.: An introduction to timing attacks. In: Timing Channels in Cryptography, pp. 1–11. Springer (2015)
-
(2015)
Timing Channels in Cryptography
, pp. 1-11
-
-
Rebeiro, C.1
Mukhopadhyay, D.2
Bhattacharya, S.3
-
13
-
-
79951833702
-
Automatically deriving information-theoretic bounds for adaptive side-channel attacks
-
Köpf, B., Basin, D.: Automatically deriving information-theoretic bounds for adaptive side-channel attacks. Journal of Computer Security 19(1), 1–31 (2011)
-
(2011)
Journal of Computer Security
, vol.19
, Issue.1
, pp. 1-31
-
-
Köpf, B.1
Basin, D.2
-
14
-
-
80052996390
-
Remote timing attacks are still practical
-
In: Atluri, V., Diaz, C. (eds.), Springer, Heidelberg
-
Brumley, B.B., Tuveri, N.: Remote timing attacks are still practical. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 355–371. Springer, Heidelberg (2011)
-
(2011)
ESORICS 2011. LNCS
, vol.6879
, pp. 355-371
-
-
Brumley, B.B.1
Tuveri, N.2
-
15
-
-
18844454571
-
Remote timing attacks are practical
-
Brumley, D., Boneh, D.: Remote timing attacks are practical. Computer Networks 48(5), 701–716 (2005)
-
(2005)
Computer Networks
, vol.48
, Issue.5
, pp. 701-716
-
-
Brumley, D.1
Boneh, D.2
-
16
-
-
84865833121
-
A cache timing attack on aes in virtualization environments
-
In: Keromytis, Angelos D. (ed.), Springer, Heidelberg
-
Weiß, Michael, Heinz, Benedikt, Stumpf, Frederic: A cache timing attack on aes in virtualization environments. In: Keromytis, Angelos D. (ed.) FC 2012. LNCS, vol. 7397, pp. 314–328. Springer, Heidelberg (2012)
-
(2012)
FC 2012. LNCS
, vol.7397
, pp. 314-328
-
-
Weiß, M.1
Heinz, B.2
Stumpf, F.3
-
18
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
Avizienis, A., Laprie, J.-C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 1(1), 11–33 (2004)
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
21
-
-
84914179040
-
Sensitivity analysis of a hierarchical model of mobile cloud computing
-
Special Issue on Resource Management in Mobile Clouds
-
Matos, R., Araujo, J., Oliveira, D., Maciel, P., Trivedi, K.: Sensitivity analysis of a hierarchical model of mobile cloud computing. Simulation Modelling Practice and Theory 50, 151–164 (2015). Special Issue on Resource Management in Mobile Clouds
-
(2015)
Simulation Modelling Practice and Theory
, vol.50
, pp. 151-164
-
-
Matos, R.1
Araujo, J.2
Oliveira, D.3
Maciel, P.4
Trivedi, K.5
|