Rethinking Security in the Era of Cloud Computing
暂无分享,去创建一个
Vyas Sekar | Jeffrey S. Chase | Michael M. Swift | Aditya Akella | Michael K. Reiter | Thomas Ristenpart | Ari Juels | Jay Aikat | A. Juels | M. Reiter | Aditya Akella | J. Chase | V. Sekar | M. Swift | T. Ristenpart | Jay Aikat
[1] Benjamin Farley,et al. Resource-freeing attacks: improve your cloud performance (at your neighbor's expense) , 2012, CCS.
[2] Michael K. Reiter,et al. Server-side verification of client behavior in cryptographic protocols , 2016, ArXiv.
[3] Ying Zhang,et al. PGA: Using Graphs to Express and Automatically Reconcile Network Policies , 2015, Comput. Commun. Rev..
[4] Michael M. Swift,et al. Scheduler-based Defenses against Cross-VM Side-channels , 2014, USENIX Security Symposium.
[5] Zhenyu Wu,et al. A Measurement Study on Co-residence Threat inside the Cloud , 2015, USENIX Security Symposium.
[6] Frederik Armknecht,et al. A Guide to Fully Homomorphic Encryption , 2015, IACR Cryptol. ePrint Arch..
[7] Andrew J. Blumberg,et al. Verifying computations without reexecuting them , 2015, Commun. ACM.
[8] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[9] Michael M. Swift,et al. A Placement Vulnerability Study in Multi-Tenant Public Clouds , 2015, USENIX Security Symposium.
[10] Thomas Ristenpart,et al. The Pythia PRF Service , 2015, USENIX Security Symposium.
[11] A. Juels. Honeywords : making password-cracking detectable Citation , 2013 .
[12] Keqiang He,et al. Next stop, the cloud: understanding modern web service deployment in EC2 and azure , 2013, Internet Measurement Conference.
[13] Vyas Sekar,et al. Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration , 2015, CCS.
[14] Vyas Sekar,et al. Bohatei: Flexible and Elastic DDoS Defense , 2015, USENIX Security Symposium.
[15] Michael K. Reiter,et al. Cross-Tenant Side-Channel Attacks in PaaS Clouds , 2014, CCS.
[16] Jeffrey S. Chase,et al. CQSTR: Securing Cross-Tenant Applications with Cloud Containers , 2016, SoCC.
[17] Michael K. Reiter,et al. Cross-VM side channels and their use to extract private keys , 2012, CCS.
[18] Aditya Akella,et al. OpenNF: enabling innovation in network function control , 2015, SIGCOMM 2015.