-
1
-
-
85065163256
-
-
Cully B, Lefebvre G, Meyer D, Feeley M, Hutchinson N, Remus A W (2008) High availability via asynchronous virtual machine replication. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, pp 161–174. San Francisco
-
Cully B, Lefebvre G, Meyer D, Feeley M, Hutchinson N, Remus A W (2008) High availability via asynchronous virtual machine replication. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, pp 161–174. San Francisco
-
-
-
-
2
-
-
85099527867
-
Rendezvous: towards fast event detecting in wireless sensor and actor networks
-
Dong M, Ota K, He L, Suguo D, Zhu H, Guo S (2013) Rendezvous: towards fast event detecting in wireless sensor and actor networks. Computing:1–16
-
(2013)
Computing
, pp. 1-16
-
-
Dong, M.1
Ota, K.2
He, L.3
Suguo, D.4
Zhu, H.5
Guo, S.6
-
3
-
-
84912536444
-
Uav-assisted data gathering in wireless sensor networks
-
Dong M, Ota K, Lin M, Tang Z, Suguo D, Zhu H (2014) Uav-assisted data gathering in wireless sensor networks. J Supercomput:1–14
-
(2014)
J Supercomput
, pp. 1-14
-
-
Dong, M.1
Ota, K.2
Lin, M.3
Tang, Z.4
Suguo, D.5
Zhu, H.6
-
4
-
-
84868152765
-
-
Duncan AJ, Creese S, Goldsmith M (2012) Insider attacks in cloud computing. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, pp 857–862. IEEE
-
Duncan AJ, Creese S, Goldsmith M (2012) Insider attacks in cloud computing. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, pp 857–862. IEEE
-
-
-
-
5
-
-
84953357852
-
-
BIG-IP Configuring High Availability F5 Networks Inc
-
BIG-IP Configuring High Availability F5 Networks Inc. http://support.f5.com/kb/enus/products/big-ip_ltm/manuals/product/tmos_management_guide_10_0_0/tmos_high_avail.html
-
-
-
-
6
-
-
84897761405
-
Security issues in cloud environments: a survey
-
Fernandes DAB, Soares LFB, Gomes JV, Freire MM, Inácio PRM (2013) Security issues in cloud environments: a survey. Int J Inf Secur:1–58
-
(2013)
Int J Inf Secur
, pp. 1-58
-
-
Fernandes, D.A.B.1
Soares, L.F.B.2
Gomes, J.V.3
Freire, M.M.4
Inácio, P.R.M.5
-
7
-
-
84953347434
-
-
IPFire
-
IPFire. http://www.ipfire.org/
-
-
-
-
8
-
-
52949097299
-
Modeling middleboxes
-
Joseph D, Stoica I (2008) Modeling middleboxes. Network, IEEE 22 (5):20–25
-
(2008)
Network, IEEE
, vol.22
, Issue.5
, pp. 20-25
-
-
Joseph, D.1
Stoica, I.2
-
9
-
-
84899825694
-
Eppdr: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid
-
Li H, Lin X, Yang H, X Liang, Lu R, Shen X (2013) Eppdr: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans Parallel Distrib Syst:1
-
(2013)
IEEE Trans Parallel Distrib Syst
, pp. 1
-
-
Li, H.1
Lin, X.2
Yang, H.3
Liang, X.4
Lu, R.5
Shen, X.6
-
10
-
-
84902287084
-
An efficient merkle-tree-based authentication scheme for smart grid
-
Li H, Rongxing L, Zhou L, Bo Y, Shen X (2013) An efficient merkle-tree-based authentication scheme for smart grid. Syst J IEEE:655–663
-
(2013)
Syst J IEEE
, pp. 655-663
-
-
Li, H.1
Rongxing, L.2
Zhou, L.3
Bo, Y.4
Shen, X.5
-
11
-
-
68649129121
-
Openflow: enabling innovation in campus networks
-
McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J (2008) Openflow: enabling innovation in campus networks. ACM SIGCOMM Comput Commun Rev 38 (2):69–74
-
(2008)
ACM SIGCOMM Comput Commun Rev
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
12
-
-
84861307113
-
The nist definition of cloud computing (draft)
-
Mell P, Grance T (2011) The nist definition of cloud computing (draft). NIST Spec Publ 800 (145):7
-
(2011)
NIST Spec Publ
, vol.800
, Issue.145
, pp. 7
-
-
Mell, P.1
Grance, T.2
-
13
-
-
84953358520
-
-
ModSecurity
-
ModSecurity. http://www.modsecurity.org/
-
-
-
-
15
-
-
84953347051
-
-
NVD
-
NVD. http://nvd.nist.gov/
-
-
-
-
16
-
-
84953355813
-
-
AWS [Online]
-
AWS [Online]. http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-security.html
-
-
-
-
17
-
-
84953345503
-
-
HackBar [Online]
-
HackBar [Online]. https://addons.mozilla.org/en-us/firefox/addon/hackbar/
-
-
-
-
18
-
-
84953353926
-
-
IXIA [Online]
-
IXIA [Online]. http://www.ixiacom.com/
-
-
-
-
19
-
-
84953356942
-
-
Nikto [Online]
-
Nikto [Online]. http://www.netsecurity.com
-
-
-
-
20
-
-
84953354596
-
-
OpenSSL [Online]
-
OpenSSL [Online]. http://www.openssl.org/
-
-
-
-
21
-
-
84953362478
-
-
SecaaS [Online]
-
SecaaS [Online]. https://cloudsecurityalliance.org/research/secaas/
-
-
-
-
22
-
-
84953366641
-
-
SQL Inject [Online]
-
SQL Inject [Online]. https://addons.mozilla.org/en-US/firefox/addon/sql-inject-me/
-
-
-
-
23
-
-
84953369889
-
-
Tamper Data [Online]
-
Tamper Data [Online]. https://addons.mozilla.org/en-us/firefox/addon/tamper-data/
-
-
-
-
24
-
-
84953355041
-
-
VMware [Online]
-
VMware [Online]. http://www.vmware.com/
-
-
-
-
25
-
-
84953355491
-
-
Zap [Online]
-
Zap [Online]. https://code.google.com/p/zaproxy/
-
-
-
-
26
-
-
84953346156
-
-
Apache HTTP Server Project
-
Apache HTTP Server Project[Online]. http://httpd.apache.org/
-
-
-
-
27
-
-
84953355084
-
-
McAfee SaaS Email Protection and Web Protection
-
McAfee SaaS Email Protection and Web Protection. http://www.mcafee.com/us/products/security-as-a-service/index.aspx
-
-
-
-
28
-
-
84883284152
-
-
Qazi ZA, Cheng-Chun T, Chiang L, Miao R, Sekar V, Minlan Y (2013) Simple-fying middlebox policy enforcement using sdn. In Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, pp 27–38, ACM
-
Qazi ZA, Cheng-Chun T, Chiang L, Miao R, Sekar V, Minlan Y (2013) Simple-fying middlebox policy enforcement using sdn. In Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, pp 27–38, ACM
-
-
-
-
29
-
-
84893281460
-
-
Rajagopalan S, Williams D, Jamjoom H (2013) Pico replication: a high availability framework for middleboxes. In Proceedings of the 4th annual Symposium on Cloud Computing, pp 1, ACM
-
Rajagopalan S, Williams D, Jamjoom H (2013) Pico replication: a high availability framework for middleboxes. In Proceedings of the 4th annual Symposium on Cloud Computing, pp 1, ACM
-
-
-
-
30
-
-
85076716117
-
-
Rajagopalan S, Williams D, Jamjoom H, Andrew W (2013) Split/merge: System support for elastic execution in virtual middleboxes. In Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation, pp 227–240, USENIX Association
-
Rajagopalan S, Williams D, Jamjoom H, Andrew W (2013) Split/merge: System support for elastic execution in virtual middleboxes. In Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation, pp 227–240, USENIX Association
-
-
-
-
31
-
-
84873369523
-
Using cloud computing to implement a security overlay network
-
Khaled S, Jose MAC, Sherali Z, Sameera A-M, Mohammed A (2013) Using cloud computing to implement a security overlay network. IEEE Secur Priv 11 (1):44–53
-
(2013)
IEEE Secur Priv
, vol.11
, Issue.1
, pp. 44-53
-
-
Khaled, S.1
Jose, M.A.C.2
Sherali, Z.3
Sameera, A.-M.4
Mohammed, A.5
-
32
-
-
84996432988
-
-
Sekar V, Egi N, Ratnasamy S, Reiter MK, Shi G (2012) Design and implementation of a consolidated middlebox architecture. In Proceedings NSDI
-
Sekar V, Egi N, Ratnasamy S, Reiter MK, Shi G (2012) Design and implementation of a consolidated middlebox architecture. In Proceedings NSDI
-
-
-
-
33
-
-
84888450226
-
-
Sekar V, Ratnasamy S, Reiter MK, Egi N, Shi G (2011) The middlebox manifesto: enabling innovation in middlebox deployment. In Proceedings of the 10th ACM Workshop on Hot Topics in Networks, pp 21, ACM
-
Sekar V, Ratnasamy S, Reiter MK, Egi N, Shi G (2011) The middlebox manifesto: enabling innovation in middlebox deployment. In Proceedings of the 10th ACM Workshop on Hot Topics in Networks, pp 21, ACM
-
-
-
-
34
-
-
84866513406
-
Making middleboxes someone else’s problem: Network processing as a cloud service
-
Sherry J, Hasan S, Scott C, Krishnamurthy A, Ratnasamy S, Sekar V (2012) Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Comput Commun Rev 42 (4):13–24
-
(2012)
ACM SIGCOMM Comput Commun Rev
, vol.42
, Issue.4
, pp. 13-24
-
-
Sherry, J.1
Hasan, S.2
Scott, C.3
Krishnamurthy, A.4
Ratnasamy, S.5
Sekar, V.6
-
35
-
-
84953364386
-
-
SpamAssassin
-
SpamAssassin. http://spamassassin.apache.org/
-
-
-
-
36
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34 (1):1–11
-
(2011)
J Netw Comput Appl
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
37
-
-
84889713681
-
-
Topilski N, Albrecht JR, Vahdat A (2008) Improving scalability and fault tolerance in an application management infrastructure. In LASCO
-
Topilski N, Albrecht JR, Vahdat A (2008) Improving scalability and fault tolerance in an application management infrastructure. In LASCO
-
-
-
-
38
-
-
84953358543
-
-
High Availability Reference Guide Vyatta Inc
-
High Availability Reference Guide Vyatta Inc. http://www.vyatta.com/downloads/documentation/VC6.5/Vyatta-HA_6.5R1_v01.pdf
-
-
-
-
39
-
-
84860595860
-
-
ACM, NY, USA
-
Wang Z, Chiachih W, Grace M, Jiang X (2012) Isolating commodity hosted hypervisors with hyperlock. In Proceedings of the 7th ACM european conference on Computer Systems, EuroSys ’12, pp 127–140. ACM, NY, USA
-
(2012)
Isolating commodity hosted hypervisors with hyperlock. In Proceedings of the 7th ACM european conference on Computer Systems, EuroSys ’12, pp 127–140
-
-
Wang, Z.1
Chiachih, W.2
Grace, M.3
Jiang, X.4
-
40
-
-
79952671882
-
-
Hanqian W, Yi D, Winer C, Li Y (2010) Network security for virtual machine in cloud computing. In Computer Sciences and Convergence Information Technology (ICCIT), 2010 5th International Conference on, pp 18–21. IEEE
-
Hanqian W, Yi D, Winer C, Li Y (2010) Network security for virtual machine in cloud computing. In Computer Sciences and Convergence Information Technology (ICCIT), 2010 5th International Conference on, pp 18–21. IEEE
-
-
-
-
41
-
-
78751506007
-
-
Yue Wu, Noonan JP, Agaian S (2010) Binary data encryption using the sudoku block cipher. In Systems Man and Cybernetics (SMC), 2010 IEEE International Conference on, pp 3915–3921. IEEE
-
Yue Wu, Noonan JP, Agaian S (2010) Binary data encryption using the sudoku block cipher. In Systems Man and Cybernetics (SMC), 2010 IEEE International Conference on, pp 3915–3921. IEEE
-
-
-
-
42
-
-
79959557055
-
Addressing cloud computing security issues
-
Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Futur Gener Comput Syst 28 (3):583–592
-
(2012)
Futur Gener Comput Syst
, vol.28
, Issue.3
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
|