Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud
暂无分享,去创建一个
[1] Stefan Berger,et al. Building a MAC-based security architecture for the Xen open-source hypervisor , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[2] Jong Hyuk Park,et al. Visual Trustworthy Monitoring System (v-TMS) for Behavior of Trusted Computing , 2010 .
[3] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[4] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[5] Renato J. O. Figueiredo,et al. Guest Editors' Introduction: Resource Virtualization Renaissance , 2005, Computer.
[6] Robert P. Goldberg,et al. Survey of virtual machine research , 1974, Computer.
[7] T. Alves,et al. TrustZone : Integrated Hardware and Software Security , 2004 .
[8] Scott A. Rotondo. Trusted Computing Group , 2011, Encyclopedia of Cryptography and Security.
[9] Gyungho Lee,et al. Micro-Architecture Support for Integrity Measurement on Dynamic Instruction Trace , 2010, J. Information Security.
[10] G. Edward Suh,et al. Design and implementation of the AEGIS single-chip secure processor using physical random functions , 2005, 32nd International Symposium on Computer Architecture (ISCA'05).
[11] Rajkumar Buyya,et al. Introduction to Cloud Computing , 2011, CloudCom 2011.
[12] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[13] Omkhar Arasaratnam,et al. Introduction to Cloud Computing , 2011 .
[14] Kjell Jørgen Hole,et al. Securing Wi-Fi Networks , 2005, Computer.