-
1
-
-
84904646472
-
Adding virtualization capabilities to the Grid'5000 testbed
-
Springer International Publishing
-
D. Balouek, A. Carpen Amarie, G. Charrier, F. Desprez, E. Jeannot, E. Jeanvoine, A. Lèbre, D. Margery, N. Niclausse, L. Nussbaum, O. Richard, C. Pérez, F. Quesnel, C. Rohr, and L. Sarzyniec. Adding virtualization capabilities to the Grid'5000 testbed. In Cloud Computing and Services Science, volume 367 of Communications in Computer and Information Science, pages 3-20. Springer International Publishing, 2013.
-
(2013)
Cloud Computing and Services Science Vol. 367 of Communications in Computer and Information Science
, pp. 3-20
-
-
Balouek, D.1
Carpen Amarie, A.2
Charrier, G.3
Desprez, F.4
Jeannot, E.5
Jeanvoine, E.6
Lèbre, A.7
Margery, D.8
Niclausse, N.9
Nussbaum, L.10
Richard, O.11
Pérez, C.12
Quesnel, F.13
Rohr, C.14
Sarzyniec, L.15
-
2
-
-
77952719747
-
Hwloc: A generic framework for managing hardware affinities in hpc applications
-
feb.
-
F. Broquedis, J. Clet-Ortega, S. Moreaud, N. Furmento, B. Goglin, G. Mercier, S. Thibault, and R. Namyst. hwloc: A Generic Framework for Managing Hardware Affinities in HPC Applications. In Parallel, Distributed and Network-Based Processing (PDP), 2010 18th Euromicro International Conference on, pages 180-186, feb. 2010.
-
(2010)
Parallel, Distributed and Network-Based Processing (PDP), 2010 18th Euromicro International Conference on
, pp. 180-186
-
-
Broquedis, F.1
Clet-Ortega, J.2
Moreaud, S.3
Furmento, N.4
Goglin, B.5
Mercier, G.6
Thibault, S.7
Namyst, R.8
-
3
-
-
84919790141
-
Improving users' isolation in iaas: Virtual machine placement with security constraints
-
Anchorage, USA, June 27-July 2 IEEE Computer Society
-
E. Caron and J. Rouzaud-Cornabas. Improving users' isolation in iaas: Virtual machine placement with security constraints. In IEEE CLOUD 2014. 7th IEEE International Conference on Cloud Computing, Anchorage, USA, June 27-July 2 2014. IEEE Computer Society.
-
(2014)
IEEE CLOUD 2014. 7th IEEE International Conference on Cloud Computing
-
-
Caron, E.1
Rouzaud-Cornabas, J.2
-
4
-
-
0002026363
-
Approximation algorithms for np-hard problems
-
PWS Publishing Co., Boston, MA, USA
-
E. G. Coffman, Jr., M. R. Garey, and D. S. Johnson. Approximation algorithms for np-hard problems. chapter Approximation Algorithms for Bin Packing: A Survey, pages 46-93. PWS Publishing Co., Boston, MA, USA, 1997.
-
(1997)
Chapter Approximation Algorithms for Bin Packing: A Survey
, pp. 46-93
-
-
Coffman, E.G.1
Garey, M.R.2
Johnson, D.S.3
-
5
-
-
84864833517
-
Sidechannel vulnerability factor: A metric for measuring information leakage
-
June
-
J. Demme, R. Martin, A. Waksman, and S. Sethumadhavan. Sidechannel vulnerability factor: A metric for measuring information leakage. In 2012 39th Annual International Symposium on Computer Architecture (ISCA), pages 106-117, June 2012.
-
(2012)
2012 39th Annual International Symposium on Computer Architecture (ISCA)
, pp. 106-117
-
-
Demme, J.1
Martin, R.2
Waksman, A.3
Sethumadhavan, S.4
-
6
-
-
77249130262
-
Outlook: Cloudy with a chance of security challenges and improvements
-
Jan.
-
T. Jaeger and J. Schiffman. Outlook: Cloudy with a Chance of Security Challenges and Improvements. IEEE Security & Privacy Magazine, 8(1):77-80, Jan. 2010.
-
(2010)
IEEE Security & Privacy Magazine
, vol.8
, Issue.1
, pp. 77-80
-
-
Jaeger, T.1
Schiffman, J.2
-
7
-
-
80053148708
-
Improving performance and availability of services hosted on iaas clouds with structural constraint-aware virtual machine placement
-
IEEE
-
D. Jayasinghe, C. Pu, T. Eilam, M. Steinder, I. Whally, and E. Snible. Improving Performance and Availability of Services Hosted on IaaS Clouds with Structural Constraint-aware Virtual Machine Placement. In Services Computing (SCC), 2011 IEEE International Conference on, pages 72-79. IEEE, 2011.
-
(2011)
Services Computing (SCC), 2011 IEEE International Conference on
, pp. 72-79
-
-
Jayasinghe, D.1
Pu, C.2
Eilam, T.3
Steinder, M.4
Whally, I.5
Snible, E.6
-
8
-
-
77954969841
-
Nohype: Virtualized cloud infrastructure without the virtualization
-
June
-
E. Keller, J. Szefer, J. Rexford, and R. B. Lee. NoHype: Virtualized Cloud Infrastructure without the Virtualization. SIGARCH Comput. Archit. News, 38(3):350-361, June 2010.
-
(2010)
SIGARCH Comput. Archit. News
, vol.38
, Issue.3
, pp. 350-361
-
-
Keller, E.1
Szefer, J.2
Rexford, J.3
Lee, R.B.4
-
9
-
-
80051588646
-
Heuristics for solving the bin-packing problem with conflicts
-
M. Maiza and M. S. Radjef. Heuristics for solving the bin-packing problem with conflicts. Applied Mathematical Sciences, 5(35):1739-1752, 2011.
-
(2011)
Applied Mathematical Sciences
, vol.5
, Issue.35
, pp. 1739-1752
-
-
Maiza, M.1
Radjef, M.S.2
-
10
-
-
85084160699
-
Lmbench: Portable tools for performance analysis
-
San Diego, CA, USA
-
L. W. McVoy, C. Staelin, et al. lmbench: Portable tools for performance analysis. In USENIX annual technical conference, pages 279-294. San Diego, CA, USA, 1996.
-
(1996)
USENIX Annual Technical Conference
, pp. 279-294
-
-
McVoy, L.W.1
Staelin, C.2
-
11
-
-
84869828737
-
Load-based covert channels between xen virtual machines
-
New York, NY, USA. ACM
-
K. Okamura and Y. Oyama. Load-based covert channels between xen virtual machines. In Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, page 173180, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10
, pp. 173180
-
-
Okamura, K.1
Oyama, Y.2
-
14
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
New York, NY, USA. ACM
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pages 199-212, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
16
-
-
84919807012
-
System-level protection against cache-based side channel attacks in the cloud
-
Berkeley, CA, USA, 2012. USENIX Association
-
K. Taesoo, M. Peinado, and G. Mainar-Ruiz. System-Level Protection Against Cache-based Side Channel Attacks in the Cloud. In Proceedings of the 21st Usenix Security Symposium, USENIX Security'12, pages 1-16, Berkeley, CA, USA, 2012. USENIX Association.
-
Proceedings of the 21st Usenix Security Symposium, USENIX Security'12
, pp. 1-16
-
-
Taesoo, K.1
Peinado, M.2
Mainar-Ruiz, G.3
-
17
-
-
0003969633
-
-
TCSEC, Technical Report DoD 5200. 28-STD, Department of Defense
-
TCSEC. Trusted Computer System Evaluation Criteria. Technical Report DoD 5200. 28-STD, Department of Defense, 1985.
-
(1985)
Trusted Computer System Evaluation Criteria
-
-
-
18
-
-
84869441988
-
Resource-freeing attacks: Improve your cloud performance (at your neighbor's expense)
-
New York, NY, USA. ACM
-
V. Varadarajan, T. Kooburat, B. Farley, T. Ristenpart, and M. M. Swift. Resource-Freeing Attacks: Improve your Cloud Performance (At your Neighbor's Expense). In Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pages 281-292, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12
, pp. 281-292
-
-
Varadarajan, V.1
Kooburat, T.2
Farley, B.3
Ristenpart, T.4
Swift, M.M.5
-
20
-
-
80052666134
-
Identification and evaluation of sharing memory covert timing channel in xen virtual machines
-
July
-
J. Wu, L. Ding, Y. Wang, and W. Han. Identification and evaluation of sharing memory covert timing channel in xen virtual machines. In 2011 IEEE International Conference on Cloud Computing (CLOUD), pages 283-291, July 2011.
-
(2011)
2011 IEEE International Conference on Cloud Computing (CLOUD)
, pp. 283-291
-
-
Wu, J.1
Ding, L.2
Wang, Y.3
Han, W.4
-
21
-
-
84945979212
-
Whispers in the hyper-space: High-speed covert channel attacks in the cloud
-
Berkeley, CA, USA, 2012. USENIX Association
-
Z. Wu, Z. Xu, and H. Wang. Whispers in the hyper-space: high-speed covert channel attacks in the cloud. In Proceedings of the 21st USENIX conference on Security symposium, Security'12, pages 9-9, Berkeley, CA, USA, 2012. USENIX Association.
-
Proceedings of the 21st USENIX Conference on Security Symposium, Security'12
, pp. 9
-
-
Wu, Z.1
Xu, Z.2
Wang, H.3
-
22
-
-
80955157902
-
An exploration of l2 cache covert channels in virtualized environments
-
New York, NY, USA. ACM
-
Y. Xu, M. Bailey, F. Jahanian, K. Joshi, M. Hiltunen, and R. Schlichting. An exploration of l2 cache covert channels in virtualized environments. In Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW '11, page 2940, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW '11
, pp. 2940
-
-
Xu, Y.1
Bailey, M.2
Jahanian, F.3
Joshi, K.4
Hiltunen, M.5
Schlichting, R.6
-
23
-
-
84934287942
-
Side channel vulnerability metrics: The promise and the pitfalls
-
New York, NY, USA, . ACM
-
T. Zhang, F. Liu, S. Chen, and R. B. Lee. Side channel vulnerability metrics: The promise and the pitfalls. In Proceedings of the 2Nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP '13, pages 2:1-2:8, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 2Nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP '13
, pp. 21-28
-
-
Zhang, T.1
Liu, F.2
Chen, S.3
Lee, R.B.4
-
24
-
-
80052008862
-
HomeAlone: Coresidency detection in the cloud via side-channel analysis
-
May
-
Y. Zhang, A. Juels, A. Oprea, and M. Reiter. HomeAlone: Coresidency detection in the cloud via side-channel analysis. In 2011 IEEE Symposium on Security and Privacy (SP), pages 313-328, May 2011.
-
(2011)
2011 IEEE Symposium on Security and Privacy (SP)
, pp. 313-328
-
-
Zhang, Y.1
Juels, A.2
Oprea, A.3
Reiter, M.4
|