Previously-Selected-Server-First based Scalable VM Placement Algorithm for Mitigating Side Channel Attacks in Cloud Computing
暂无分享,去创建一个
[1] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[2] Kevin R. B. Butler,et al. Detecting co-residency with active traffic analysis techniques , 2012, CCSW '12.
[3] Jeffrey O. Kephart. Autonomic computing: the first decade , 2011, ICAC '11.
[4] Michael K. Reiter,et al. HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis , 2011, 2011 IEEE Symposium on Security and Privacy.
[5] Edgar R. Weippl,et al. Cloudoscopy: services discovery and topology mapping , 2013, CCSW.
[6] Jaijit Bhattacharya,et al. Utility computing-based framework for e-governance , 2008, ICEGOV '08.
[7] Christopher Leckie,et al. Security Games for Virtual Machine Allocation in Cloud Computing , 2013, GameSec.
[8] Jörn Altmann,et al. A pricing information service for grid computing , 2007, MGC '07.
[9] Matti A. Hiltunen,et al. An exploration of L2 cache covert channels in virtualized environments , 2011, CCSW '11.
[10] Li Jing,et al. Utility-based Virtual Cloud Resource Allocation Model and Algorithm in Cloud Computing , 2015 .
[11] Zhenyu Wu,et al. A Measurement Study on Co-residence Threat inside the Cloud , 2015, USENIX Security Symposium.
[12] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[13] Michael M. Swift,et al. A Placement Vulnerability Study in Multi-Tenant Public Clouds , 2015, USENIX Security Symposium.
[14] Michael K. Reiter,et al. Cross-VM side channels and their use to extract private keys , 2012, CCS.
[15] Henry Hoffmann,et al. Decision making in autonomic computing systems: comparison of approaches and techniques , 2011, ICAC '11.