Physical attack protection with human-secure virtualization in data centers
暂无分享,去创建一个
Ruby B. Lee | Jakub Szefer | Pramod A. Jamkhedkar | Yu-Yuan Chen | Jakub Szefer | R. Lee | Yu-Yuan Chen
[1] Rajkumar Buyya,et al. Market-Oriented Cloud Computing: Vision, Hype, and Reality of Delivering Computing as the 5th Utility , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.
[2] Ruby B. Lee,et al. Scalable architectural support for trusted software , 2010, HPCA - 16 2010 The Sixteenth International Symposium on High-Performance Computer Architecture.
[3] Ramya Jayaram Masti. On the security of virtual machine migration and related topics , 2010 .
[4] Herbert J. Mattord,et al. Principles of Information Security , 2004 .
[5] Christoph Meinel,et al. Infrastructure as a service security: Challenges and solutions , 2010, 2010 The 7th International Conference on Informatics and Systems (INFOS).
[6] Ruby B. Lee,et al. Architecture for protecting critical secrets in microprocessors , 2005, 32nd International Symposium on Computer Architecture (ISCA'05).
[7] Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.
[8] Ruby B. Lee,et al. Architectural support for hypervisor-secure virtualization , 2012, ASPLOS XVII.
[9] Lawrence J. Fennelly. Effective Physical Security , 2004 .
[10] Sean W. Smith,et al. Building the IBM 4758 Secure Coprocessor , 2001, Computer.
[11] Ruby B. Lee,et al. Hardware-rooted trust for secure key management and transient trust , 2007, CCS '07.