-
2
-
-
85013843068
-
Virtual switching without a hyervisor for a ore secure Cloud
-
USENIX Association
-
X. Jin, E. Keller, J. Rexford, "Virtual switching without a hyervisor for a ore secure Cloud, Proceedings of the 2nd USENIX conference on Hot Topics in Management of Internet, Cloud, and Entreprise N etworks and Services, (pp. 99), USENIX Association, 2012 .
-
(2012)
Proceedings of the 2nd USENIX Conference on Hot Topics in Management of Internet, Cloud, and Entreprise N Etworks and Services
, pp. 99
-
-
Jin, X.1
Keller, E.2
Rexford, J.3
-
3
-
-
80755169480
-
Eliminating the hypervisor attack surface for a more secure Cloud
-
ACM, October
-
J. Szefer, E. Keller, R-B. Lee, J. Rexford, "Eliminating the hypervisor attack surface for a more secure Cloud", Proceedings of the 18th ACM conference on Computer and comunications security (pp. 40 1-412), ACM, October 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Comunications Security
, pp. 401-412
-
-
Szefer, J.1
Keller, E.2
Lee, R.-B.3
Rexford, J.4
-
4
-
-
77954969841
-
NoHype: Virtualized c1ud inrrastructure without the virtualization
-
ACM, June
-
E. Keller, J. Szefer, J. Rexford, R-B. Lee, "NoHype: Virtualized c1ud inrrastructure without the virtualization", ACM SIGARCH Computer Architecture News (Vol. 38, No. 3, pp. 350-361), ACM, June 2010.
-
(2010)
ACM SIGARCH Computer Architecture News
, vol.38
, Issue.3
, pp. 350-361
-
-
Keller, E.1
Szefer, J.2
Rexford, J.3
Lee, R.-B.4
-
5
-
-
84858773328
-
Architectural Support for Hypervisorsecure virtualization
-
ACM, March
-
J. Szefer, R-B. Lee, "Architectural Support for Hypervisorsecure virtualization", ACM SIGPLAN Notices (Vol. 47, No. 4, pp. 437-450), ACM, March 2012.
-
(2012)
ACM SIGPLAN Notices
, vol.47
, Issue.4
, pp. 437-450
-
-
Szefer, J.1
Lee, R.-B.2
-
6
-
-
84992205432
-
-
inpressco. com
-
B. Kanoongo, P. Jagani, P. Mehta, L. Kurup, "Exosition of Solutions to hypervisor vulnerabilities", inpressco. com, 2014.
-
(2014)
Exosition of Solutions to Hypervisor Vulnerabilities
-
-
Kanoongo, B.1
Jagani, P.2
Mehta, P.3
Kurup, L.4
-
7
-
-
85013749918
-
Towards a hypervisor security-based service and its research challenges
-
April
-
T. Shree, M. Kumar, N. Badal, "Towards a hypervisor security-based service and its research challenges", International Journal of Computer Applications, Vol. 115, No. 17, 38-42, April 2015.
-
(2015)
International Journal of Computer Applications
, vol.115
, Issue.17
, pp. 38-42
-
-
Shree, T.1
Kumar, M.2
Badal, N.3
-
8
-
-
84992219731
-
A survey over virtualization and hypervisor
-
October
-
K-R. Bhatele, M. Bhatele, AArjaria, APahade, "A survey over virtualization and hypervisor", International Journal of odem Engineering & Management Research, Vol. I, Issue 3, ISSN: 2320-9984, October 2013
-
(2013)
International Journal of Odem Engineering & Management Research
, vol.1
, Issue.3
-
-
Bhatele, K.-R.1
Bhatele, M.2
Arjaria, A.3
Pahade, A.4
-
10
-
-
78449249325
-
Network forensic frameworks: Survey and research challenges
-
E-S. Pilli, R-C. Joshi, R. Niyogi, "Network forensic frameworks: Survey and research challenges", Digital Investigation, Vo1. 7, No. 1/2, pp. 14-27, 2010
-
(2010)
Digital Investigation
, vol.7
, Issue.1-2
, pp. 14-27
-
-
Pilli, E.-S.1
Joshi, R.-C.2
Niyogi, R.3
-
11
-
-
79952018833
-
Cyber crime scene investigations (C2;SI) through Cloud Computing
-
F. Xinwen, L. Zhen, Y. Wei, L. Junzhou, "Cyber crime scene investigations (C2;SI) through Cloud Computing" in IEEE 30'h International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 26-31, 2010.
-
(2010)
IEEE 30'h International Conference on Distributed Computing Systems Workshops (ICDCSW)
, pp. 26-31
-
-
Xinwen, F.1
Zhen, L.2
Wei, Y.3
Junzhou, L.4
-
13
-
-
80053139108
-
Multi-dimensional SLA-based resource allocation for multi-tier Cloud Computing systems
-
July
-
H. Goudarzi, M. Pedram, "Multi-dimensional SLA-based resource allocation for multi-tier Cloud Computing systems", Cloud Computing (CLOUD), IEEE International Conference on (pp. 324-331), July 2011.
-
(2011)
Cloud Computing (CLOUD) IEEE International Conference on
, pp. 324-331
-
-
Goudarzi, H.1
Pedram, M.2
-
14
-
-
77957959132
-
Secure virtual machine execution under an untrusted management OS
-
July
-
C. Li, ARaghunathan, N-K. Jha, "Secure virtual machine execution under an untrusted management OS", Cloud Computing (CLOUD), 2010 IEEE 3td International Conference on (pp. 172-179), July 2010.
-
(2010)
Cloud Computing (CLOUD), 2010 IEEE 3td International Conference on
, pp. 172-179
-
-
Li, C.1
Raghunathan, A.2
Jha, N.-K.3
-
16
-
-
84992182956
-
-
M. S. thesis, Dept. Computer Science, Missouri Univ. of Science and Technology, Rolla, MS
-
K-K. Fletcher, "Cloud security requirements analysis and security policy development using a high-order objectoriented modeling", M. S. thesis, Dept. Computer Science, Missouri Univ. of Science and Technology, Rolla, MS, 2010.
-
(2010)
Cloud Security Requirements Analysis and Security Policy Development Using A High-order Objectoriented Modeling
-
-
Fletcher, K.-K.1
-
17
-
-
84992182952
-
Intrusion detection techniques performance in Cloud environments
-
Kuala Lumpur, Malaysia
-
F. Sabahi, "Intrusion detection techniques performance in Cloud environments", Proc. Conf. on Coputer Design and Engineering, Kuala Lumpur, Malaysia, . 398-402, 2011.
-
(2011)
Proc. Conf. on Coputer Design and Engineering
, pp. 398-402
-
-
Sabahi, F.1
-
18
-
-
77955212682
-
A lightweight approach to provide Iifetime hypervisor control-flow integrity
-
May
-
Z. wang, X. Jiang, "A lightweight approach to provide Iifetime hypervisor control-flow integrity", Proceedings of the IEEE Symosium on Security and Privacy, S&P, pp. 380-395, May 2010.
-
(2010)
Proceedings of the IEEE Symosium on Security and Privacy, S&P
, pp. 380-395
-
-
Wang, Z.1
Jiang, X.2
-
19
-
-
84880192224
-
Security and privacy in cloud computing: A survey
-
November
-
M. Zhou, R. Zhang, W. Xie, W. Qian, AZhou, "Security and privacy in Cloud Computing: A survey", International Conference on Semantics Knowledge and Grid, SKG, pp. I 05-112, November 2010.
-
(2010)
International Conference on Semantics Knowledge and Grid, SKG
, pp. 105-112
-
-
Zhou, M.1
Zhang, R.2
Xie, W.3
Qian Azhou, W.4
-
22
-
-
0010155667
-
-
Harris Louis Associates Tech. Rep., conducted for Equifax Inc. 1, 255 adults of the U. S. public
-
A Westin and Harris Louis Associates, "Harris-equifax consumer privacy survey", Tech. Rep., conducted for Equifax Inc. 1, 255 adults of the U. S. public, 1991.
-
(1991)
Harris-equifax Consumer Privacy Survey
-
-
Westin, A.1
|