-
2
-
-
62949225623
-
-
Grid Computing Environments Workshop
-
Ian Foster, Yan Zhao, Ioan Raicu, and Shiyong Lu, "Cloud Computing and Grid Computing 360-Degree Compared, " in Grid Computing Environments Workshop, 2008.
-
(2008)
Cloud Computing and Grid Computing 360-Degree Compared
-
-
Foster, I.1
Zhao, Y.2
Raicu, I.3
Lu, S.4
-
4
-
-
84887724123
-
An analysis of security issues for cloud computing
-
Keiko and Rosado, David G and Fernandez-Medina, Eduardo and Fernandez, Eduardo B Hashizume, "An analysis of security issues for cloud computing, " Journal of Internet Services and Applications, vol. 4, 2013.
-
(2013)
Journal of Internet Services and Applications
, vol.4
-
-
Keiko1
Rosado David, G.2
Eduardo, F.3
Fernandez, E.B.H.4
-
7
-
-
85013649001
-
-
Sahoo, Jyotiprakash and Mohapatra, Subasish and Lath, Radha, "Virtualization: A survey on concepts, taxonomy and associated security issues, " 2010.
-
(2010)
Virtualization: A Survey on Concepts, Taxonomy and Associated Security Issues
-
-
Jyotiprakash, S.1
Subasish, M.2
Radha, L.3
-
8
-
-
78751697134
-
Security in multi-Tenancy cloud
-
San Jose, CA
-
Amarnath and Shah, Payal and Nagaraj, Rajeev and Pendse, Ravi Jasti, "Security in multi-Tenancy cloud, " in Security Technology (ICCST), 2010 IEEE International Carnahan Conference on, San Jose, CA, 2010, pp. 35-41.
-
(2010)
Security Technology (ICCST) 2010 IEEE International Carnahan Conference on
, pp. 35-41
-
-
Amarnath1
Payal, S.2
Rajeev, N.3
Ravi Jasti, P.4
-
10
-
-
84863174772
-
-
Shengmei and Lin, Zhaoji and Chen, Xiaohua and Yang, Zhuolin and Chen, Jianyong Luo, "Virtualization security for cloud computing service, " 2011.
-
(2011)
Virtualization Security for Cloud Computing Service
-
-
Shengmei1
Zhaoji, L.2
Xiaohua, C.3
Zhuolin, Y.4
Jianyong Luo, C.5
-
12
-
-
84908404193
-
An adaptive utilization accelerator for virtualized environments
-
Boston
-
Breitgand, David and Dubitzky, Zvi and Epstein, Amir and Feder, Oshrit and Glikson, Alex and Shapira, Inbar and Toffetti, Giovanni, "An adaptive utilization accelerator for virtualized environments, " in Cloud Engineering (IC2E), 2014 IEEE International Conference on, Boston, 2014, pp. 165-174.
-
(2014)
Cloud Engineering (IC2E) 2014 IEEE International Conference on
, pp. 165-174
-
-
David, B.1
Zvi, D.2
Amir, E.3
Oshrit, F.4
Alex, G.5
Inbar, S.6
Giovanni, T.7
-
13
-
-
80052756561
-
Towards automated business-driven indication and mitigation of VM sprawl in Cloud supply chains
-
Dublin
-
Maik and McDonald, Fiona and McLarnon, Barry and Robinson, Philip Lindner, "Towards automated business-driven indication and mitigation of VM sprawl in Cloud supply chains, " in Integrated Network Management (IM), 2011 IFIP/IEEE International Symposium on, Dublin, 2011, pp. 1062-1065.
-
(2011)
Integrated Network Management (IM) 2011 IFIP/ IEEE International Symposium on
, pp. 1062-1065
-
-
Maik1
Fiona, M.2
Barry, M.3
Philip Lindner, R.4
-
14
-
-
84861488693
-
On state of the art in virtual machine security
-
Orlando, FL
-
Qian and Mehrotra, Rajat and Dubeyy, A and Abdelwahed, Sherif and Rowland, Krisa Chen, "On state of the art in virtual machine security, " in Southeastcon, 2012 Proceedings of IEEE, Orlando, FL, 2012.
-
(2012)
Southeastcon 2012 Proceedings of IEEE
-
-
Qian1
Rajat, M.2
Dubeyy, A.3
Sherif, A.4
Krisa Chen, R.5
-
15
-
-
85013685416
-
Patch management system for multi-platform environment
-
Springer Berlin Heidelberg
-
Jung-Taek and Choi, Dae-Sik and Park, Eung-Ki and Shon, Tae-Shik and Moon, Jongsub Seo, "Patch management system for multi-platform environment, " in Parallel and Distributed Computing: Applications and Technologies.: Springer Berlin Heidelberg, 2005, pp. 654-661.
-
(2005)
Parallel and Distributed Computing: Applications and Technologies
, pp. 654-661
-
-
Jung-Taek1
Dae-Sik, C.2
Eung-Ki, P.3
Tae-Shik, S.4
Jongsub Seo, M.5
-
17
-
-
74049145625
-
Managing security of virtual machine images in a cloud environment
-
Jinpeng and Zhang, Xiaolan and Ammons, Glenn and Bala, Vasanth and Ning, Peng Wei, "Managing security of virtual machine images in a cloud environment, " in Proceedings of the 2009 ACM workshop on Cloud computing security, 2009, pp. 91-96.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 91-96
-
-
Jinpeng1
Xiaolan, Z.2
Glenn, A.3
Vasanth, B.4
Peng Wei, N.5
-
18
-
-
84907000617
-
Virtual machine allocation policies against co-resident attacks in cloud computing
-
Sydney, NSW
-
Yi and Chan, Jeffrey and Alpcan, Tansu and Leckie, Christopher Han, "Virtual machine allocation policies against co-resident attacks in cloud computing, " in Communications (ICC), 2014 IEEE International Conference on, Sydney, NSW, 2014, pp. 786-792.
-
(2014)
Communications (ICC) 2014 IEEE International Conference on
, pp. 786-792
-
-
Yi1
Jeffrey, C.2
Tansu, A.3
Christopher Han, L.4
-
19
-
-
80052008862
-
Homealone: Co-residency detection in the cloud via side-channel analysis
-
Berkeley, CA
-
Yinqian and Juels, Ari and Oprea, Alina and Reiter, Michael K Zhang, "Homealone: Co-residency detection in the cloud via side-channel analysis, " in Security and Privacy (SP), 2011 IEEE Symposium on, Berkeley, CA, 2011.
-
(2011)
Security and Privacy (SP) 2011 IEEE Symposium on
-
-
Yinqian1
Juels, A.2
Opera, A.3
Reiter, M.K.Z.4
|