-
2
-
-
74049152260
-
Hey, you, get off my cloud! exploring information leakage in third-party compute clouds
-
Chicago, IL, USA, November 9-13. ACM, New York, NY, USA
-
Ristenpart, T., Tromer, E. and Shacham, H. (2009) Hey, You, Get Off My Cloud! Exploring Information Leakage in Third-Party Compute Clouds. Proc. 16th ACM Conf. Computer and Communications Security, Chicago, IL, USA, November 9-13, pp. 199-212. ACM, New York, NY, USA.
-
(2009)
Proc. 16th ACM Conf. Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
-
3
-
-
84880237695
-
A position paper on data sovereignty: The importance of geolocating data in the cloud
-
Portland, OR, USA, June 14-15. USENIX Association, Berkeley, CA, USA
-
Peterson, Z. N. J., Gondree, M. and Beverly, R. (2011) A Position Paper on Data Sovereignty: The Importance of Geolocating Data in the Cloud. Proc. USENIX Workshop on Hot Topics in Cloud Computing, Portland, OR, USA, June 14-15, pp. 9-13. USENIX Association, Berkeley, CA, USA.
-
(2011)
Proc. USENIX Workshop on Hot Topics in Cloud Computing
, pp. 9-13
-
-
Peterson, Z.N.J.1
Gondree, M.2
Beverly, R.3
-
4
-
-
80955142131
-
Do you know where your cloud files are? Proc
-
Chicago, IL, USA, October 17-21. ACM, New York, NY, USA
-
Benson, K., Dowsley, R. and Shacham, H. (2011) Do You Know Where Your Cloud Files Are? Proc. 3rd ACM workshop on Cloud computing security workshop, Chicago, IL, USA, October 17-21, pp. 73-82. ACM, New York, NY, USA.
-
(2011)
3rd ACM Workshop on Cloud Computing Security Workshop
, pp. 73-82
-
-
Benson, K.1
Dowsley, R.2
Shacham, H.3
-
5
-
-
84869808633
-
LoSt: Location based storage
-
Raleigh, NC, USA, October 19. ACM, New York, NY, USA
-
Watson, G. J., Safavi-Naini, R. and Alimomeni, M. (2012) LoSt: Location Based Storage. Proc. 2012 ACM Workshop on Cloud Computing Security Workshop, Raleigh, NC, USA, October 19, pp. 59-70. ACM, New York, NY, USA.
-
(2012)
Proc. 2012 ACM Workshop on Cloud Computing Security Workshop
, pp. 59-70
-
-
Watson, G.J.1
Safavi-Naini, R.2
Alimomeni, M.3
-
6
-
-
84874845364
-
Geolocation of data in the cloud
-
San Antonio, TX, USA, February 18 ACM, New York, NY, USA
-
Gondree, M. and Peterson, Z. N. J. (2013) Geolocation of Data in the Cloud. Proc. 3rd ACM Conference on Data and Application Security and Privacy, San Antonio, TX, USA, February 18, pp. 25-36. ACM, New York, NY, USA.
-
(2013)
Proc. 3rd ACM Conference on Data and Application Security and Privacy
, pp. 25-36
-
-
Gondree, M.1
Peterson, Z.N.J.2
-
8
-
-
84943398937
-
-
University of Illinois at Urbana-Champaign(accessed July 6
-
University of Illinois at Urbana-Champaign. IP Address to Latitude/ Longitude. http://cello. cs. uiuc. edu/cgi-bin/slamm/ip2ll/ (accessed July 6, 2014).
-
(2014)
IP Address to Latitude/ Longitude
-
-
-
9
-
-
84943407738
-
-
accessed July 6
-
Whois. net. Domains. http://www. whois. net/ (accessed July 6, 2014).
-
(2014)
Domains
-
-
-
10
-
-
0034782006
-
An investigation of geographic mapping techniques for Internet hosts
-
San Diego, CA, USA, August 29. ACM, New York, NY, USA
-
Padmanabhan, V. N. and Subramanian, L. (2001) An investigation of geographic mapping techniques for Internet hosts. Proc. ACM SIGCOMM Conference, San Diego, CA, USA, August 29, pp. 173-185. ACM, New York, NY, USA.
-
(2001)
Proc. ACM SIGCOMM Conference
, pp. 173-185
-
-
Padmanabhan, V.N.1
Subramanian, L.2
-
11
-
-
33745897370
-
Constraint-Based Geolocation of Internet Hosts
-
Gueye, B., Ziviani, A. and Crovella,M. (2006) Constraint-Based Geolocation of Internet Hosts. ACM Trans. Netw., 14, 6:1219-6:1232.
-
(2006)
ACM Trans. Netw.
, vol.14
, pp. 61219-61232
-
-
Gueye, B.1
Ziviani, A.2
Crovella, M.3
-
12
-
-
34547469869
-
Towards IP geolocation using delay and topology measurements
-
Rio de Janeriro, Brazil, October 25-27. ACM, New York, NY, USA
-
Katz-Bassett, E., John, J. P. and Arvind Krishnamurthy, P. (2006) Towards IP Geolocation Using Delay and Topology Measurements. Proc. ACM Internet Measurement Conf., Rio de Janeriro, Brazil, October 25-27, pp. 78-84. ACM, New York, NY, USA.
-
(2006)
Proc. ACM Internet Measurement Conf
, pp. 78-84
-
-
Katz-Bassett, E.1
John, J.P.2
Arvind Krishnamurthy, P.3
-
13
-
-
77954317179
-
Octant: A comprehensive framework for the geolocalization of internet hosts
-
Cambridge, MA, April 11-13. USENIX Association, Berkeley, CA, USA
-
Wong, B., Stoyanov, I. and Sirer, E. (2007) Octant: A Comprehensive Framework for the Geolocalization of Internet Hosts. Proc. USENIX Conf. Networked Systems Design and Implementation, Cambridge, MA, April 11-13, pp. 23-33. USENIX Association, Berkeley, CA, USA.
-
(2007)
Proc. USENIX Conf. Networked Systems Design and Implementation
, pp. 23-33
-
-
Wong, B.1
Stoyanov, I.2
Sirer, E.3
-
14
-
-
13844281021
-
Improving the accuracy of measurement-based geographic location of Internet hosts
-
Ziviani, A., Fdida, S. and de Rezende, J. F. (2005) Improving the accuracy of measurement-based geographic location of Internet hosts. Comput. Netw., 47, 4:503-4:523.
-
(2005)
Comput. Netw.
, vol.47
, pp. 4503-4523
-
-
Ziviani, A.1
Fdida, S.2
De Rezende, J.F.3
-
15
-
-
84871775618
-
IP-geolocation mapping for moderately connected Internet regions
-
Li, D., Chen, J. and Guo, C. (2013) Ip-geolocation mapping for moderately connected Internet regions. IEEE Trans. Parallel Distrib. Syst., 24, 2:381-2:391.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, pp. 2381-2391
-
-
Li, D.1
Chen, J.2
Guo, C.3
-
16
-
-
74049102823
-
Provable data possession at untrusted stores
-
Alexandria, Virginia, USA, October 29. ACM, New York, NY, USA
-
Ateniese, G., Burns, R. and Curtmola, R. (2007) Provable Data Possession at Untrusted Stores. Proc. 14th ACM Conf. Computer and Communications Security, Alexandria, Virginia, USA, October 29, pp. 598-609. ACM, New York, NY, USA.
-
(2007)
Proc. 14th ACM Conf. Computer and Communications Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
-
17
-
-
84943424558
-
A comparative survey on various provable data possession schemes of integrity verification in single and multi cloud environments
-
Abraham, K. and John, W. M. (2013) A comparative survey on various provable data possession schemes of integrity verification in single and multi cloud environments. Int. J. Eng., 2, 17:37-17:44.
-
(2013)
Int. J. Eng.
, vol.2
, pp. 1737-1744
-
-
Abraham, K.1
John, W.M.2
-
18
-
-
74049144464
-
Hail: A highavailability and integrity layer for cloud storage
-
Chicago, IL, USA, November 9-13. ACM, New York, NY, USA
-
Bowers, K., Juels, A. and Oprea, A. (2009) Hail: A highavailability and integrity layer for cloud storage. Proc. 16th ACM Conf. on Computer and Communications Security, Chicago, IL, USA, November 9-13, pp. 187-198. ACM, New York, NY, USA.
-
(2009)
Proc. 16th ACM Conf. on Computer and Communications Security
, pp. 187-198
-
-
Bowers, K.1
Juels, A.2
Oprea, A.3
-
19
-
-
78149247803
-
-
Trusted Computing Group(accessed May 5
-
Trusted Computing Group. TPM Specification Version 1. 2 Revision 103: Part 1-Design Principles. http://www. trustedcom putinggroup. org/files/resource-files/646BE624-1D09-3519-AD DA61BE37A21A74/mainP1DPrev103. pdf (accessed May 5, 2013).
-
(2013)
TPM Specification Version 1. 2 Revision 103: Part 1-Design Principles
-
-
-
20
-
-
84943392039
-
-
Trusted Computing Group(accessed May 5
-
Trusted Computing Group. TPM Specification Version 1. 2 Revision 103: Part 2-Structures. http://www. trustedcomputinggroup. org/files/resource-files/8D3D6571-1D09-3519-AD22EA2911D 4E9D0/mainP2Structrev103. pdf (accessed May 5, 2013).
-
(2013)
TPM Specification Version 1. 2 Revision 103: Part 2-Structures
-
-
-
21
-
-
84943403389
-
-
Trusted Computing Group(accessed May 5
-
Trusted Computing Group. TPM Specification Version 1. 2 Revision 103: Part 3. Commands. http://www. trustedcomputing group. org/files/resource-files/E14A09AD-1A4B-B294-D049A CC1A1A138ED/mainP3Commandsrev103. pdf (accessed May 5, 2013).
-
(2013)
TPM Specification Version 1. 2 Revision 103: Part 3. Commands
-
-
-
22
-
-
84975240564
-
Improved remote attestation mechanism of platform configuration based on chameleon hashes
-
Fu, D. L. and Peng, X. G. (2013) Improved remote attestation mechanism of platform configuration based on Chameleon Hashes. Comput. Sci., 40, 1:118-1:121.
-
(2013)
Comput. Sci.
, vol.40
, pp. 1118-1121
-
-
Fu, D.L.1
Peng, X.G.2
-
23
-
-
84866540011
-
Remote attestation using chameleon hash and dynamic Huffman Merkle Hash tree
-
Fu, D. L. and Chen, G. X. (2012). Remote attestation using chameleon hash and dynamic Huffman Merkle Hash tree. J. Comput. Inf. Syst., 8, 17:7103-17:7112.
-
(2012)
J. Comput. Inf. Syst.
, vol.8
, pp. 177103-177112
-
-
Fu, D.L.1
Chen, G.X.2
-
24
-
-
84874534280
-
Improved remote attestation mechanism based on group signatures and unbalanced merkle hash tree
-
Fu, D. L. and Chen, G. X. (2013) Improved remote attestation mechanism based on group signatures and unbalanced Merkle Hash Tree. J. Inf. Comput. Sci., 10, 3:773-3:781.
-
(2013)
J. Inf. Comput. Sci.
, vol.10
, pp. 3773-3781
-
-
Fu, D.L.1
Chen, G.X.2
-
25
-
-
84874532797
-
Remote attestation mechanism of platform configuration based on dynamic Huffman tree
-
Fu, D. L., Peng, X. G. and Chen, G. X. (2012) Remote attestation mechanism of platform configuration based on dynamic Huffman tree. J. Comput. Appl., 32, 8:2275-8:2279+8:2282.
-
(2012)
J. Comput. Appl.
, vol.32
-
-
Fu, D.L.1
Peng, X.G.2
Chen, G.X.3
-
26
-
-
84881582001
-
Trusted platform module-based scheme for secure access to outsourced data
-
Fu, D. L., Peng, X. G. and Yang, Y. L. (2013) Trusted platform module-based scheme for secure access to outsourced data. J. Electron. Inf. Technol., 35, 7:1766-7:1773.
-
(2013)
J. Electron. Inf. Technol.
, vol.35
, pp. 71766-71773
-
-
Fu, D.L.1
Peng, X.G.2
Yang, Y.L.3
-
28
-
-
84943417279
-
-
January 1
-
AMD. AMD64 Architecture Programmer's Manual. http:// support. amd. com/us/Processor-TechDocs/24593-APM-v2. pdf (January 1, 2014).
-
(2014)
AMD64 Architecture Programmer's Manual
-
-
-
30
-
-
85015375134
-
Dude, where's that IP? Circumventing measurement-based IP geolocation
-
Washington, DC, August 11-13. USENIX Association, Berkeley, CA, USA
-
Gill, P., Ganjali, Y. and Wong, B. (2010) Dude, Where's That IP? Circumventing Measurement-Based IP Geolocation. Proc. 19th USENIX Conf. Security, Washington, DC, August 11-13, pp. 16-26. USENIX Association, Berkeley, CA, USA.
-
(2010)
Proc. 19th USENIX Conf. Security
, pp. 16-26
-
-
Gill, P.1
Ganjali, Y.2
Wong, B.3
-
31
-
-
84889069075
-
Architecture for concurrent execution of secure environments in clouds
-
Berlin, Germany, November 4-8. ACM, New York, NY, USA
-
Jayaram Masti, R., Marforio, C. and Capkun, S. (2013) Architecture for Concurrent Execution of Secure Environments in Clouds. Proc. 2013 ACM Workshop on Cloud Computing Security Workshop, Berlin, Germany, November 4-8, pp. 11-22. ACM, New York, NY, USA.
-
(2013)
Proc. 2013 ACM Workshop on Cloud Computing Security Workshop
, pp. 11-22
-
-
Jayaram Masti, R.1
Marforio, C.2
Capkun, S.3
-
32
-
-
77952132371
-
Flicker: An execution infrastructure for TCB minimization
-
McCune, J. M., Parno, B. J. and Perrig, A. (2008) Flicker: an execution infrastructure for TCB minimization. ACM SIGOPS Operating Systems Review. ACM, 42, 4:315-4:328.
-
(2008)
ACM SIGOPS Operating Systems Review. ACM
, vol.42
, pp. 4315-4328
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
-
33
-
-
82055200280
-
Actvsm: A dynamic virtualization platform for enforcement of application integrity
-
Beijing, China, December 13-15. Springer, Berlin, Heidelberg
-
Toegl, R., Pirker, M. and Gissing, M. (2010) acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity. Trusted Systems, Second International Conference, Beijing, China, December 13-15, pp. 326-345. Springer, Berlin, Heidelberg.
-
(2010)
Trusted Systems, Second International Conference
, pp. 326-345
-
-
Toegl, R.1
Pirker, M.2
Gissing, M.3
-
34
-
-
84943376797
-
-
accessed December 5
-
Crawler4j. http://code. google. com/p/crawler4j/ (accessed December 5, 2013).
-
(2013)
-
-
-
37
-
-
78650777991
-
CloudSim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms
-
Calheiros, R. N., Ranjan, R. and Beloglazov, A. (2011) CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Softw. Pract. Exp., 41, 1:23-1:50.
-
(2011)
Softw. Pract. Exp.
, vol.41
, pp. 123-150
-
-
Calheiros, R.N.1
Ranjan, R.2
Beloglazov, A.3
-
38
-
-
84943402817
-
-
CloudSim Projects(accessed December 5
-
CloudSim Projects. http://www. cloudbus. org/cloudsim/ (accessed December 5, 2013).
-
(2013)
-
-
-
40
-
-
84869436864
-
Policy-sealed data: A new abstraction for building trusted cloud services
-
Bellevue, WA, USA, August 8-10. USENIX Association, Berkeley, CA, USA
-
Santos, N., Rodrigues, R., Gummadi, K. P. and Saroiu, S. (2012) Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services. Proceedings of the 21st USENIX Security Symposium, Bellevue, WA, USA, August 8-10, pp. 175-188. USENIX Association, Berkeley, CA, USA.
-
(2012)
Proceedings of the 21st USENIX Security Symposium
, pp. 175-188
-
-
Santos, N.1
Rodrigues, R.2
Gummadi, K.P.3
Saroiu, S.4
-
41
-
-
84883356757
-
Using trusted platform modules for location assurance in cloud networking
-
Madrid, Spain, June 3-4. Springer, Berlin, Heidelberg
-
Krauß, C. and Fusenig, V. (2013) Using Trusted Platform Modules for Location Assurance in Cloud Networking. Network and System Security-7th International Conference, Madrid, Spain, June 3-4, pp. 109-211. Springer, Berlin, Heidelberg.
-
(2013)
Network and System Security-7th International Conference
, pp. 109-211
-
-
Krauß, C.1
Fusenig, V.2
-
42
-
-
84943374627
-
-
Trusted Computing Group(accessed July 6
-
Trusted Computing Group. Cloud computing and security-a natural match. http://www. trustedcomputinggroup. org/files/ resource-files/1F4DEE3D-1A4B-B294-D0AD0742BA449E07/ Cloud%20Computing%20and%20Security%20Whitepaper- July29. 2010. pdf (accessed July 6, 2014).
-
(2014)
Cloud Computing and Security-a Natural Match
-
-
|