메뉴 건너뛰기




Volumn , Issue , 2015, Pages 588-595

Microarchitecture-Aware Virtual Machine Placement under Information Leakage Constraints

Author keywords

Cloud; Covert channels; Isolation; Microarchitecture; Security; Virtual Machine Placement

Indexed keywords

CLOUDS; COMPUTER ARCHITECTURE; VIRTUAL REALITY;

EID: 84960173045     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CLOUD.2015.84     Document Type: Conference Paper
Times cited : (5)

References (24)
  • 3
    • 84919790141 scopus 로고    scopus 로고
    • Improving users' isolation in iaas: Virtual machine placement with security constraints
    • Anchorage, USA, June 27-July 2 IEEE Computer Society
    • E. Caron and J. Rouzaud-Cornabas. Improving users' isolation in iaas: Virtual machine placement with security constraints. In IEEE CLOUD 2014. 7th IEEE International Conference on Cloud Computing, Anchorage, USA, June 27-July 2 2014. IEEE Computer Society.
    • (2014) IEEE CLOUD 2014. 7th IEEE International Conference on Cloud Computing
    • Caron, E.1    Rouzaud-Cornabas, J.2
  • 6
    • 77249130262 scopus 로고    scopus 로고
    • Outlook: Cloudy with a chance of security challenges and improvements
    • Jan.
    • T. Jaeger and J. Schiffman. Outlook: Cloudy with a Chance of Security Challenges and Improvements. IEEE Security & Privacy Magazine, 8(1):77-80, Jan. 2010.
    • (2010) IEEE Security & Privacy Magazine , vol.8 , Issue.1 , pp. 77-80
    • Jaeger, T.1    Schiffman, J.2
  • 8
    • 77954969841 scopus 로고    scopus 로고
    • Nohype: Virtualized cloud infrastructure without the virtualization
    • June
    • E. Keller, J. Szefer, J. Rexford, and R. B. Lee. NoHype: Virtualized Cloud Infrastructure without the Virtualization. SIGARCH Comput. Archit. News, 38(3):350-361, June 2010.
    • (2010) SIGARCH Comput. Archit. News , vol.38 , Issue.3 , pp. 350-361
    • Keller, E.1    Szefer, J.2    Rexford, J.3    Lee, R.B.4
  • 9
    • 80051588646 scopus 로고    scopus 로고
    • Heuristics for solving the bin-packing problem with conflicts
    • M. Maiza and M. S. Radjef. Heuristics for solving the bin-packing problem with conflicts. Applied Mathematical Sciences, 5(35):1739-1752, 2011.
    • (2011) Applied Mathematical Sciences , vol.5 , Issue.35 , pp. 1739-1752
    • Maiza, M.1    Radjef, M.S.2
  • 10
    • 85084160699 scopus 로고    scopus 로고
    • Lmbench: Portable tools for performance analysis
    • San Diego, CA, USA
    • L. W. McVoy, C. Staelin, et al. lmbench: Portable tools for performance analysis. In USENIX annual technical conference, pages 279-294. San Diego, CA, USA, 1996.
    • (1996) USENIX Annual Technical Conference , pp. 279-294
    • McVoy, L.W.1    Staelin, C.2
  • 17
    • 0003969633 scopus 로고
    • TCSEC, Technical Report DoD 5200. 28-STD, Department of Defense
    • TCSEC. Trusted Computer System Evaluation Criteria. Technical Report DoD 5200. 28-STD, Department of Defense, 1985.
    • (1985) Trusted Computer System Evaluation Criteria
  • 20


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.