StorM: Enabling Tenant-Defined Cloud Storage Middle-Box Services
暂无分享,去创建一个
[1] Abhinav Srivastava,et al. Self-service cloud computing , 2012, CCS '12.
[2] Ming Zhang,et al. An untold story of middleboxes in cellular networks , 2011, SIGCOMM.
[3] James Won-Ki Hong,et al. CYRUS: towards client-defined cloud storage , 2015, EuroSys.
[4] Minlan Yu,et al. FlowTags: enforcing network-wide policies in the presence of dynamic middlebox actions , 2013, HotSDN '13.
[5] Minlan Yu,et al. SIMPLE-fying middlebox policy enforcement using SDN , 2013, SIGCOMM.
[6] Dongsheng Wang,et al. Virtual-Machine-based Intrusion Detection on File-aware Block Level Storage , 2006, 2006 18th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD'06).
[7] Wenke Lee,et al. Secure and Flexible Monitoring of Virtual Machines , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[8] Andrea C. Arpaci-Dusseau,et al. Analysis of HDFS under HBase: a facebook messages case study , 2014, FAST.
[9] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[10] Krishna P. Gummadi,et al. Towards Trusted Cloud Computing , 2009, HotCloud.
[11] Ion Stoica,et al. A policy-aware switching layer for data centers , 2008, SIGCOMM '08.
[12] Martín Casado,et al. The Design and Implementation of Open vSwitch , 2015, NSDI.
[13] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[14] Navendu Jain,et al. Understanding network failures in data centers: measurement, analysis, and implications , 2011, SIGCOMM.
[15] Ben Riva,et al. Salus: a system for server-aided secure function evaluation , 2012, CCS.
[16] Eugene H. Spafford,et al. The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.
[17] Vyas Sekar,et al. The middlebox manifesto: enabling innovation in middlebox deployment , 2011, HotNets-X.
[18] Jaime G. Carbonell,et al. A Machine Text-Inspired Machine Learning Approach for Identification of Transmembrane Helix Boundaries , 2005, ISMIS.
[19] Fotis Tsifountidis,et al. Virtualization Security: Virtual Machine Monitoring and Introspection , 2011 .
[20] Rajani Sharma,et al. A Case of Multilevel Security Application for Ensuring Data Integrity (Prevention and Detection) in Cloud Environment , 2014 .
[21] Mingqiang Li,et al. CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal , 2015, IEEE Internet Computing.