메뉴 건너뛰기




Volumn 2014-November, Issue November, 2014, Pages 9-20

Co-location-resistant clouds

Author keywords

Bin packing; Cloud computing; Co location attacks; Co location resistance; Cross VM attacks; Cryptography; Isolation

Indexed keywords

CLOUD COMPUTING; CRYPTOGRAPHY; LOCATION; VIRTUAL MACHINE;

EID: 84937709982     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2664168.2664179     Document Type: Conference Paper
Times cited : (81)

References (25)
  • 3
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multi-party cryptographic protocols
    • R. Canetti. Security and composition of multi-party cryptographic protocols. Journal of Cryptology, 13(1), 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1
    • Canetti, R.1
  • 5
    • 0001491336 scopus 로고
    • Resource constrained scheduling as generalized bin packing
    • Series A
    • M. R Garey, R. L. Graham, D. S. Johnson, and A. Yao. Resource constrained scheduling as generalized bin packing. Journal of Combinatorial Theory, Series A, 21(3):257-298, 1976.
    • (1976) Journal of Combinatorial Theory , vol.21 , Issue.3 , pp. 257-298
    • Garey, M.R.1    Graham, R.L.2    Johnson, D.S.3    Yao, A.4
  • 7
    • 85073538603 scopus 로고    scopus 로고
    • System-level protection against cache-based side channel attacks in the cloud
    • T. Kim, M. Peinado, and G. Mainar-Ruiz. System-level protection against cache-based side channel attacks in the cloud. In USENIX Security, 2012.
    • (2012) USENIX Security
    • Kim, T.1    Peinado, M.2    Mainar-Ruiz, G.3
  • 11
    • 84864837138 scopus 로고    scopus 로고
    • Timewarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks
    • R. Martin, J. Demme, and S. Sethumadhavan. Timewarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks. ACM SIGARCH Computer Architecture News, 40(3):118-129, 2012.
    • (2012) ACM SIGARCH Computer Architecture News , vol.40 , Issue.3 , pp. 118-129
    • Martin, R.1    Demme, J.2    Sethumadhavan, S.3
  • 12
    • 20744445610 scopus 로고    scopus 로고
    • A bound on the deviation probability for sums of non-negative random variables
    • A. Maurer. A bound on the deviation probability for sums of non-negative random variables. Journal of Inequalities in Pure and Applied Mathematics, 4(1):15, 2003.
    • (2003) Journal of Inequalities in Pure and Applied Mathematics , vol.4 , Issue.1 , pp. 15
    • Maurer, A.1
  • 17
    • 0022012946 scopus 로고
    • Amortized efficiency of list update and paging rules
    • D. Sleator and R. Tarjan. Amortized efficiency of list update and paging rules. Communications of the ACM, 28(2):202-208, 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.2 , pp. 202-208
    • Sleator, D.1    Tarjan, R.2
  • 21
    • 35348816106 scopus 로고    scopus 로고
    • New cache designs for thwarting software cache-based side channel attacks
    • Z. Wang and R. Lee. New cache designs for thwarting software cache-based side channel attacks. ACM SIGARCH Computer Architecture News, 35(2):494-505, 2007.
    • (2007) ACM SIGARCH Computer Architecture News , vol.35 , Issue.2 , pp. 494-505
    • Wang, Z.1    Lee, R.2
  • 23
    • 0000930151 scopus 로고    scopus 로고
    • There is no asymptotic PTAs for two-dimensional vector packing
    • G. Woeginger. There is no asymptotic PTAS for two-dimensional vector packing. Information Processing Letters, 64(6):293-297, 1997.
    • (1997) Information Processing Letters , vol.64 , Issue.6 , pp. 293-297
    • Woeginger, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.