Efficient access of Cloud Resources through virtualization techniques
暂无分享,去创建一个
[1] A. Volokyta,et al. Secure virtualization in cloud computing , 2012, Proceedings of International Conference on Modern Problem of Radio Engineering, Telecommunications and Computer Science.
[2] Michael W. Hicks,et al. Automated detection of persistent kernel control-flow attacks , 2007, CCS '07.
[3] Xuxian Jiang,et al. Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing , 2008, RAID.
[4] Siani Pearson,et al. Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[5] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[6] Kevin A. Kwiat,et al. A tamper-resistant framework for unambiguous detection of attacks in user space using process monitors , 2003, First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings..
[7] Frank Siebenlist. Challenges and opportunities for virtualized security in the clouds , 2009, SACMAT '09.
[8] J. IBMT.,et al. virtualization and hardware-based security , 2009 .
[9] Yoshiyasu Takefuji,et al. A novel approach for a file-system integrity monitor tool of Xen virtual machine , 2007, ASIACCS '07.
[10] Harit Shah,et al. Security Issues on Cloud Computing , 2013, ArXiv.
[11] William J. Caelli,et al. Mutual Protection in a Cloud Computing Environment , 2010, 2010 IEEE 12th International Conference on High Performance Computing and Communications (HPCC).
[12] Richard Wolski,et al. The Eucalyptus Open-Source Cloud-Computing System , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.
[13] Wenke Lee,et al. Lares: An Architecture for Secure Active Monitoring Using Virtualization , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[14] Rafael R. Obelheiro,et al. Overlay Network Topology Reconfiguration in Byzantine Settings , 2007 .
[15] P. Sai Kiran,et al. Issues in Cloud Computing , 2011 .
[16] Eddy Caron,et al. Cloud Computing Resource Management through a Grid Middleware: A Case Study with DIET and Eucalyptus , 2009, 2009 IEEE International Conference on Cloud Computing.
[17] Adam Lackorzynski,et al. Virtual machines jailed: virtualization in systems with small trusted computing bases , 2009, VDTS '09.
[18] Miguel Correia,et al. Resilient Intrusion Tolerance through Proactive and Reactive Recovery , 2007, 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007).
[19] Zhoujun Li,et al. VM-based Architecture for Network Monitoring and Analysis , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[20] Balachandra Reddy Kandukuri,et al. Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.
[21] Gustavo Alonso,et al. Engineering the cloud from software modules , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[22] Roberto Di Pietro,et al. A Security Management Architecture for the Protection of Kernel Virtual Machines , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.