Planning Dependability of Virtualised Networks
暂无分享,去创建一个
[1] V. Tosic,et al. The Common Information Model (CIM) standard - an analysis of features and open issues , 1999, 4th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services. TELSIKS'99 (Cat. No.99EX365).
[2] Hao Zhou,et al. Transport Layer Security (TLS) Session Resumption without Server-Side State , 2008, RFC.
[3] Eric Rescorla,et al. SSLACC: A Clustered SSL Accelerator , 2002, USENIX Security Symposium.
[4] Farnam Jahanian,et al. Empirical Exploitation of Live Virtual Machine Migration , 2007 .
[5] Maurice Israël,et al. Heuristics to Perform Molecular Decomposition of Large Mission-Critical Information Systems , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.
[6] Alan L. Cox,et al. Optimizing network virtualization in Xen , 2006 .
[7] William H. Sanders,et al. Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.
[8] Marco Domenico Aime,et al. Policy-Driven System Configuration for Dependability , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.