-
1
-
-
34548029519
-
Container-based operating system virtualization: A scalable, highperformance alternative to hypervisors
-
S. Soltesz, H. Pötzl, M. E. Fiuczynski, A. Bavier, and L. Peterson, "Container-based operating system virtualization: a scalable, highperformance alternative to hypervisors", in ACM SIGOPS Operating Systems Review, vol. 41, no. 3, 2007, pp. 275-287.
-
(2007)
ACM SIGOPS Operating Systems Review
, vol.41
, Issue.3
, pp. 275-287
-
-
Soltesz, S.1
Pötzl, H.2
Fiuczynski, M.E.3
Bavier, A.4
Peterson, L.5
-
2
-
-
84994835500
-
20 cloud security considerations for supporting the internet of things
-
submitted
-
J. Singh, T. Pasquier, J. Bacon, H. Ko, and D. Eyers, "20 Cloud Security Considerations for Supporting the Internet of Things", submitted, IEEE Internet of Things Journal, 2015.
-
(2015)
IEEE Internet of Things Journal
-
-
Singh, J.1
Pasquier, T.2
Bacon, J.3
Ko, H.4
Eyers, D.5
-
3
-
-
85076688797
-
πBox: A platform for privacy-preserving apps
-
S. Lee, E. L. Wong, D. Goel, M. Dahlin, and V. Shmatikov, "πBox: A Platform for Privacy-Preserving Apps." in 10th USENIX Symposium on Networked System Design and Implementation, 2013, pp. 501-514.
-
(2013)
10th USENIX Symposium on Networked System Design and Implementation
, pp. 501-514
-
-
Lee, S.1
Wong, E.L.2
Goel, D.3
Dahlin, M.4
Shmatikov, V.5
-
4
-
-
84866604942
-
Keeping information safe from social networking apps
-
ACM
-
B. Viswanath, E. Kiciman, and S. Saroiu, "Keeping information safe from social networking apps", in Proceedings of the 2012 ACM workshop on Workshop on online social networks. ACM, 2012, pp. 49-54.
-
(2012)
Proceedings of the 2012 ACM Workshop on Workshop on Online Social Networks
, pp. 49-54
-
-
Viswanath, B.1
Kiciman, E.2
Saroiu, S.3
-
5
-
-
0003400251
-
Secure computer systems: Mathematical foundations and model
-
Bedford MA, Tech. Rep. M74-244, May
-
D. E. Bell and L. J. LaPadula, "Secure Computer Systems: Mathematical Foundations and Model", The MITRE Corp., Bedford MA, Tech. Rep. M74-244, May 1973.
-
(1973)
The MITRE Corp.
-
-
Bell, D.E.1
La Padula, L.J.2
-
6
-
-
0003400255
-
Integrity considerations for secure computer systems
-
K. J. Biba, "Integrity Considerations for Secure Computer Systems", MITRE Corp., Tech. Rep. ESD-TR 76-372, 1977.
-
(1977)
MITRE Corp., Tech. Rep
-
-
Biba, K.J.1
-
8
-
-
84944337916
-
Integrating middleware with information flow control
-
IEEE
-
J. Singh, T. Pasquier, J. Bacon, and D. Eyers, "Integrating Middleware with Information Flow Control", in International Conference on Cloud Engineering (IC2E). IEEE, 2015.
-
(2015)
International Conference on Cloud Engineering (IC2E)
-
-
Singh, J.1
Pasquier, T.2
Bacon, J.3
Eyers, D.4
-
9
-
-
84863165969
-
Kernel korner: Loadable kernel module programming and system call interception
-
Feb.
-
N. Dhanjani and G. Rodriguez-Rivera, "Kernel Korner: Loadable Kernel Module Programming and System Call Interception", Linux Journal, no. 82es, Feb. 2001.
-
(2001)
Linux Journal
, Issue.82
-
-
Dhanjani, N.1
Rodriguez-Rivera, G.2
-
10
-
-
85180527583
-
Traps and pitfalls: Practical problems in system call interposition based security tools
-
T. Garfinkel, "Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools." in NDSS, vol. 3, 2003, pp. 163-176.
-
(2003)
NDSS
, vol.3
, pp. 163-176
-
-
Garfinkel, T.1
-
11
-
-
85084162296
-
Exploiting concurrency vulnerabilities in system call wrappers
-
R. N. Watson, "Exploiting Concurrency Vulnerabilities in System Call Wrappers." WOOT, vol. 7, pp. 1-8, 2007.
-
(2007)
WOOT
, vol.7
, pp. 1-8
-
-
Watson, R.N.1
-
13
-
-
84860745989
-
Elastic application container: A lightweight approach for cloud resource provisioning
-
IEEE
-
S. He, L. Guo, Y. Guo, C. Wu, M. Ghanem, and R. Han, "Elastic application container: A lightweight approach for cloud resource provisioning", in 26th International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2012, pp. 15-22.
-
(2012)
26th International Conference on Advanced Information Networking and Applications (AINA)
, pp. 15-22
-
-
He, S.1
Guo, L.2
Guo, Y.3
Wu, C.4
Ghanem, M.5
Han, R.6
-
14
-
-
57749192483
-
Information flow control for standard OS abstractions
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris, "Information Flow Control for Standard OS Abstractions", in 21st ACM Symposium on Operating Systems Principles, 2007, pp. 321-334.
-
(2007)
21st ACM Symposium on Operating Systems Principles
, pp. 321-334
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
16
-
-
80053628507
-
From system-centric to datacentric logging-accountability, trust & Security in cloud computing
-
IEEE
-
R. K. Ko, M. Kirchberg, and B. S. Lee, "From System-centric to Datacentric Logging-accountability, Trust & Security in Cloud Computing", in Defense Science Research Conference and Expo (DSR), 2011. IEEE, 2011, pp. 1-4.
-
(2011)
Defense Science Research Conference and Expo (DSR), 2011
, pp. 1-4
-
-
Ko, R.K.1
Kirchberg, M.2
Lee, B.S.3
-
17
-
-
84944318145
-
-
Queen Mary University of London, School of Law, Tech. Rep.
-
K. Hon, C. Millard, C. Reed, J. Singh, I. Walden, and J. Crowcroft, "Policy, Legal and Regulatory Implications of a Europe-Only Cloud", Queen Mary University of London, School of Law, Tech. Rep., 2014. [Online]. Available: http://papers.ssrn. com/sol3/Delivery.cfm/SSRN ID2527951 code1577160.pdf
-
(2014)
Policy, Legal and Regulatory Implications of a Europe-only Cloud
-
-
Hon, K.1
Millard, C.2
Reed, C.3
Singh, J.4
Walden, I.5
Crowcroft, J.6
-
19
-
-
84900000827
-
Information flow control for secure cloud computing
-
March
-
J. Bacon, D. Eyers, T. Pasquier, J. Singh, I. Papagiannis, and P. Pietzuch, "Information Flow Control for Secure Cloud Computing", IEEE TNSM SI Cloud Service Management, vol. 11, no. 1, pp. 76-89, March 2014.
-
(2014)
IEEE TNSM SI Cloud Service Management
, vol.11
, Issue.1
, pp. 76-89
-
-
Bacon, J.1
Eyers, D.2
Pasquier, T.3
Singh, J.4
Papagiannis, I.5
Pietzuch, P.6
|