-
1
-
-
84875711591
-
Confidentiality-preserving optimal power flow for cloud computing
-
BORDEN, A. R., MOLZAHN, D. K., RAMANATHAN, P., AND LESIEUTRE, B. C. Confidentiality-preserving optimal power flow for cloud computing. In Allerton Control Conference (2012).
-
(2012)
Allerton Control Conference
-
-
Borden, A.R.1
Molzahn, D.K.2
Ramanathan, P.3
Lesieutre, B.C.4
-
2
-
-
84869447330
-
Self-service cloud computing
-
BUTT, S., LAGAR-CAVILLA, H. A., SRIVASTAVA, A., AND GANAPATHY, V. Self-service cloud computing. In Proc. of ACM CCS (2012), pp. 253–264.
-
(2012)
Proc. Of ACM CCS
, pp. 253-264
-
-
Butt, S.1
Lagar-Cavilla, H.A.2
Srivastava, A.3
Ganapathy, V.4
-
3
-
-
82655165294
-
Breaking up is hard to do: Security and functionality in a commodity hypervisor
-
COLP, P., NANAVATI, M., ZHU, J., AIELLO, W., COKER, G., DEEGAN, T., LOSCOCCO, P., AND WARFIELD, A. Breaking up is hard to do: security and functionality in a commodity hypervisor. In Proc. of ACM SOSP (2011), pp. 189–202.
-
(2011)
Proc. Of ACM SOSP
, pp. 189-202
-
-
Colp, P.1
Nanavati, M.2
Zhu, J.3
Aiello, W.4
Coker, G.5
Deegan, T.6
Loscocco, P.7
Warfield, A.8
-
6
-
-
85081774739
-
More for your money: Exploiting performance heterogeneity in public clouds
-
FARLEY, B., JUELS, A., VARADARAJAN, V., RISTENPART, T., BOWERS, K. D., AND SWIFT, M. M. More for your money: exploiting performance heterogeneity in public clouds. In Proc. of ACM Symposium on Cloud Computing (2012), pp. 1–14.
-
(2012)
Proc. Of ACM Symposium on Cloud Computing
, pp. 1-14
-
-
Farley, B.1
Juels, A.2
Varadarajan, V.3
Ristenpart, T.4
Bowers, K.D.5
Swift, M.M.6
-
7
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
Mar
-
GENTRY, C. Computing arbitrary functions of encrypted data. Commun. ACM 53, 3 (Mar. 2010), 97–105.
-
(2010)
Commun. ACM
, vol.53
, Issue.3
, pp. 97-105
-
-
Gentry, C.1
-
8
-
-
85043238089
-
Dominant resource fairness: Fair allocation of multiple resource types
-
GHODSI, A., ZAHARIA, M., HINDMAN, B., KONWINSKI, A., SHENKER, S., AND STOICA, I. Dominant resource fairness: fair allocation of multiple resource types. In Proc. of USENIX NSDI (2011), pp. 24–24.
-
(2011)
Proc. Of USENIX NSDI
, pp. 24
-
-
Ghodsi, A.1
Zaharia, M.2
Hindman, B.3
Konwinski, A.4
Shenker, S.5
Stoica, I.6
-
10
-
-
0038180715
-
Load profile estimation in electric transmission networks using independent component analysis
-
LIAO, H., AND NIEBUR, D. Load profile estimation in electric transmission networks using independent component analysis. IEEE Trans. on Power Systems 18, 2 (2003), 707–715.
-
(2003)
IEEE Trans. On Power Systems
, vol.18
, Issue.2
, pp. 707-715
-
-
Liao, H.1
Niebur, D.2
-
11
-
-
84876897874
-
Toward a reliable, secure and fault tolerant smart grid state estimation in the cloud
-
MAHESHWARI, K., LIM, M., WANG, L., BIRMAN, K., AND VAN RENESSE, R. Toward a reliable, secure and fault tolerant smart grid state estimation in the cloud. IEEE PES Innovative Smart Grid Technologies (2013).
-
(2013)
IEEE PES Innovative Smart Grid Technologies
-
-
Maheshwari, K.1
Lim, M.2
Wang, L.3
Birman, K.4
van Renesse, R.5
-
12
-
-
77952329878
-
Improving xen security through disaggregation
-
MURRAY, D. G., MILOS, G., AND HAND, S. Improving Xen security through disaggregation. In Proc. of ACM Intl. Conf. on Virtual Execution Environments (2008), pp. 151–160.
-
(2008)
Proc. Of ACM Intl. Conf. Of Virtual Execution Environments
, pp. 151-160
-
-
Murray, D.G.1
Milos, G.2
Hand, S.3
-
14
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
RISTENPART, T., TROMER, E., SHACHAM, H., AND SAVAGE, S. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proc. of ACM CCS (2009), pp. 199–212.
-
(2009)
Proc. Of ACM CCS
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
15
-
-
80755169480
-
Eliminating the hypervisor attack surface for a more secure cloud
-
SZEFER, J., KELLER, E., LEE, R. B., AND REXFORD, J. Eliminating the hypervisor attack surface for a more secure cloud. In Proc. of ACM CCS (2011), pp. 401–412.
-
(2011)
Proc. Of ACM CCS
, pp. 401-412
-
-
Szefer, J.1
Keller, E.2
Lee, R.B.3
Rexford, J.4
-
16
-
-
84869441988
-
Resource-freeing attacks: Improve your cloud performance (at your neighbor’s expense)
-
VARADARAJAN, V., KOOBURAT, T., FARLEY, B., RISTENPART, T., AND SWIFT, M. M. Resource-freeing attacks: improve your cloud performance (at your neighbor’s expense). In Proc. of ACM CCS (2012), pp. 281–292.
-
(2012)
Proc. Of ACM CCS
, pp. 281-292
-
-
Varadarajan, V.1
Kooburat, T.2
Farley, B.3
Ristenpart, T.4
Swift, M.M.5
-
17
-
-
77955212682
-
HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
WANG, Z., AND JIANG, X. Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In Proc. of IEEE Symp. on Security and Privacy (SP) (2010), pp. 380–395.
-
(2010)
Proc. Of IEEE Symp. Of Security and Privacy (SP)
, pp. 380-395
-
-
Wang, Z.1
Jiang, X.2
-
18
-
-
84869859962
-
Cross-vm side channels and their use to extract private keys
-
ZHANG, Y., JUELS, A., REITER, M. K., AND RISTENPART, T. Cross-vm side channels and their use to extract private keys. In Proc. of ACM CCS (2012), pp. 305–316.
-
(2012)
Proc. Of ACM CCS
, pp. 305-316
-
-
Zhang, Y.1
Juels, A.2
Reiter, M.K.3
Ristenpart, T.4
|