Virtualization-level security in cloud computing
暂无分享,去创建一个
[1] Richard M. Fujimoto,et al. Computing global virtual time in shared-memory multiprocessors , 1997, TOMC.
[2] Laxmikant V. Kale,et al. Pose: scalable general-purpose parallel discrete event simulation , 2005 .
[3] David Talbot,et al. Vulnerability Seen in Amazon's Cloud-Computing New research reveals how to find would-be victims within cloud hardware. , 2009 .
[4] Nancy R. Mead,et al. Security quality requirements engineering (SQUARE) methodology , 2005, SESS@ICSE.
[5] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[6] David E. Y. Sarna,et al. Implementing and Developing Cloud Computing Applications , 2010 .
[7] Ian T. Foster,et al. Designing and building parallel programs - concepts and tools for parallel software engineering , 1995 .
[8] Edward Mascarenhas,et al. ParaSol: a multithreaded system for parallel simulation based on mobile threads , 1995, WSC '95.
[9] Hao Jianguo. Research of BOM Component and Simulation Engine Based on DEVS , 2010 .
[10] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[11] Farzad Sabahi,et al. Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[12] Kalyan S. Perumalla,et al. /spl mu/sik - a micro-kernel for parallel/distributed simulation systems , 2005, Workshop on Principles of Advanced and Distributed Simulation (PADS'05).