ASSURING INTEGRITY OF DATAFLOW PROCESSING IN CLOUD COMPUTING INFRASTRUCTURE
暂无分享,去创建一个
[1] Elaine Shi,et al. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems , 2005, SOSP '05.
[2] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[3] Jennifer Widom,et al. STREAM: The Stanford Stream Data Manager , 2003, IEEE Data Eng. Bull..
[4] Trent Jaeger,et al. Design and Implementation of a TCG-based Integrity Measurement Architecture , 2004, USENIX Security Symposium.
[5] Philip S. Yu,et al. SPADE: the system s declarative stream processing engine , 2008, SIGMOD Conference.
[6] Stefan Berger,et al. TVDc: managing security in the trusted virtual datacenter , 2008, OPSR.
[7] Ying Xing,et al. The Design of the Borealis Stream Processing Engine , 2005, CIDR.
[8] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[9] Juan A. Garay,et al. Software integrity protection using timed executable agents , 2006, ASIACCS '06.
[10] Elaine Shi,et al. BIND: a fine-grained attestation service for secure distributed systems , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[11] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[12] Wu-chang Feng,et al. Fides: remote anomaly-based cheat detection using client emulation , 2009, CCS.
[13] Thomas Hess,et al. Software as a Service , 2008, Wirtschaftsinf..
[14] Fabian Monrose,et al. Distributed Execution with Remote Audit , 1999, NDSS.
[15] Gustavo Alonso,et al. Web Services: Concepts, Architectures and Applications , 2009 .