Trusted Click: Overcoming Security issues of NFV in the Cloud
暂无分享,去创建一个
[1] Thomas E. Anderson,et al. An End to the Middle , 2009, HotOS.
[2] Ada Gavrilovska,et al. Fast, Scalable and Secure Onloading of Edge Functions Using AirBox , 2016, 2016 IEEE/ACM Symposium on Edge Computing (SEC).
[3] David M. Eyers,et al. SCONE: Secure Linux Containers with Intel SGX , 2016, OSDI.
[4] Galen C. Hunt,et al. Shielding Applications from an Untrusted Cloud with Haven , 2014, OSDI.
[5] Zhi Liu,et al. Embark: Securely Outsourcing Middleboxes to the Cloud , 2016, NSDI.
[6] Roberto Bifulco,et al. ClickOS and the Art of Network Function Virtualization , 2014, NSDI.
[7] Eddie Kohler,et al. The Click modular router , 1999, SOSP.
[8] Ahmad-Reza Sadeghi,et al. AmazonIA: when elasticity snaps back , 2011, CCS '11.
[9] Mohan Kumar,et al. S-NFV: Securing NFV states by using SGX , 2016, SDN-NFV@CODASPY.
[10] Michael K. Reiter,et al. HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis , 2011, 2011 IEEE Symposium on Security and Privacy.
[11] Vyas Sekar,et al. The middlebox manifesto: enabling innovation in middlebox deployment , 2011, HotNets-X.
[12] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[13] Srinivas Devadas,et al. Intel SGX Explained , 2016, IACR Cryptol. ePrint Arch..
[14] Vyas Sekar,et al. Design and Implementation of a Consolidated Middlebox Architecture , 2012, NSDI.
[15] Sylvia Ratnasamy,et al. BlindBox: Deep Packet Inspection over Encrypted Traffic , 2015, SIGCOMM.
[16] Sylvia Ratnasamy,et al. BlindBox: Deep Packet Inspection over Encrypted Traffic , 2015, SIGCOMM.
[17] EDDIE KOHLER,et al. The click modular router , 2000, TOCS.
[18] References , 1971 .
[19] Vyas Sekar,et al. Making middleboxes someone else's problem: network processing as a cloud service , 2012, SIGCOMM '12.
[20] Aditya Akella,et al. OpenNF , 2014, SIGCOMM.
[21] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[22] Minlan Yu,et al. Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags , 2014, NSDI.