메뉴 건너뛰기




Volumn , Issue , 2005, Pages

When virtual is harder than real: Security challenges in virtual machine based computing environments

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY;

EID: 84944386303     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (169)

References (13)
  • 1
    • 84958656559 scopus 로고    scopus 로고
    • Pseudo-random” number generation within cryptographic algorithms: The DDS case
    • M. Bellare, S. Goldwasser, and D. Micciancio.”Pseudo-random” number generation within cryptographic algorithms: The DDS case. In CRYPTO, pages 277-291, 1997.
    • (1997) CRYPTO , pp. 277-291
    • Bellare, M.1    Goldwasser, S.2    Micciancio, D.3
  • 2
    • 0002738343 scopus 로고
    • Security problems in the TCP/IP protocol suite
    • S. M. Bellovin. Security problems in the TCP/IP protocol suite. SIGCOMM Comput. Commun. Rev., 19(2):32-48, 1989.
    • (1989) SIGCOMM Comput. Commun. Rev , vol.19 , Issue.2 , pp. 32-48
    • Bellovin, S. M.1
  • 3
    • 38149027490 scopus 로고    scopus 로고
    • When virtual is better than real
    • (HOTOS-VIII), Schloss Elmau, Germany, May
    • P. M. Chen and B. D. Noble. When virtual is better than real. In (HOTOS-VIII), Schloss Elmau, Germany, May 2001.
    • (2001)
    • Chen, P. M.1    Noble, B. D.2
  • 4
    • 11844249640 scopus 로고    scopus 로고
    • Revirt: Enabling intrusion analysis through virtual-machine logging and replay
    • G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. Revirt: Enabling intrusion analysis through virtual-machine logging and replay. In OSDI, 2002.
    • (2002) OSDI
    • Dunlap, G. W.1    King, S. T.2    Cinar, S.3    Basrai, M. A.4    Chen, P. M.5
  • 11
    • 18844373595 scopus 로고    scopus 로고
    • Virtual appliances in the Collective: A road to hassle-free computing
    • (HOTOS-XI), May
    • C. Sapuntzakis and M. S. Lam. Virtual appliances in the Collective: A road to hassle-free computing. In (HOTOS-XI), May 2003.
    • (2003)
    • Sapuntzakis, C.1    Lam, M. S.2
  • 12
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C.-P. Schnorr. Efficient signature generation by smart cards. J. Cryptology, 4(3):161-174, 1991.
    • (1991) J. Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.-P.1
  • 13
    • 27544510809 scopus 로고    scopus 로고
    • Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
    • August
    • H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier. Shield: Vulnerability-driven network filters for preventing known vulnerability exploits. In Proc. of ACM SIGCOMM, August 2004.
    • (2004) Proc. of ACM SIGCOMM
    • Wang, H. J.1    Guo, C.2    Simon, D. R.3    Zugenmaier, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.