Verifying cloud services
暂无分享,去创建一个
[1] Maurice Herlihy,et al. Linearizability: a correctness condition for concurrent objects , 1990, TOPL.
[2] Christian Cachin,et al. Integrity Protection for Revision Control , 2009, ACNS.
[3] Huan Liu,et al. A new form of DOS attack in a cloud and its avoidance mechanism , 2010, CCSW '10.
[4] George Candea,et al. The S2E Platform: Design, Implementation, and Applications , 2012, TOCS.
[5] Noga Alon,et al. Regular Languages are Testable with a Constant Number of Queries , 2000, SIAM J. Comput..
[6] Krishna P. Gummadi,et al. Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services , 2012, USENIX Security Symposium.
[7] Elaine Shi,et al. Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection , 2011, HotOS.
[8] Trent Jaeger,et al. Seeding clouds with trust anchors , 2010, CCSW '10.
[9] Travis D. Breaux,et al. Managing multi-jurisdictional requirements in the cloud: towards a computational legal landscape , 2011, CCSW '11.
[10] Eduard Ayguadé,et al. A survey on performance management for internet applications , 2010 .
[11] Jeffrey S. Chase,et al. Strong accountability for network storage , 2007, TOS.
[12] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[13] J-C. Laprie,et al. DEPENDABLE COMPUTING AND FAULT TOLERANCE : CONCEPTS AND TERMINOLOGY , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995, ' Highlights from Twenty-Five Years'..
[14] Idit Keidar,et al. Fail-Aware Untrusted Storage , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[15] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[16] Ron Patton,et al. Software Testing , 2000 .
[17] Chris Loosley,et al. High-Performance Client/Server , 1997 .
[18] Alysson Neves Bessani,et al. DepSky: dependable and secure storage in a cloud-of-clouds , 2011, EuroSys '11.
[19] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[20] James C. King. A new approach to program testing , 1975 .
[21] Evan Marcus,et al. Blueprints for high availability , 2000 .
[22] Matthias Schunter,et al. Secure cloud maintenance: protecting workloads against insider attacks , 2012, ASIACCS '12.
[23] Nicolas Marchand,et al. Experience with CONSER: A System for Server Control through Fluid Modeling , 2011, IEEE Transactions on Computers.
[24] George Candea,et al. S2E: a platform for in-vivo multi-path analysis of software systems , 2011, ASPLOS XVI.
[25] Ariel J. Feldman,et al. SPORC: Group Collaboration using Untrusted Cloud Resources , 2010, OSDI.
[26] Scott Shenker,et al. Attested append-only memory: making adversaries stick to their word , 2007, SOSP.
[27] Chen Wang,et al. A Collaborative Monitoring Mechanism for Making a Multitenant Platform Accountable , 2010, HotCloud.
[28] Siani Pearson,et al. Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[29] Mauro Pezzè,et al. Software testing and analysis - process, principles and techniques , 2007 .
[30] Emin Gün Sirer,et al. Logical attestation: an authorization architecture for trustworthy computing , 2011, SOSP.
[31] Ryszard Kowalczyk,et al. Policy-Based Automation of SLA Establishment for Cloud Computing Services , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).
[32] Stefan Tai,et al. What Are You Paying For? Performance Benchmarking for Infrastructure-as-a-Service Offerings , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[33] Peter R. Pietzuch,et al. CloudFilter: practical control of sensitive data propagation to the cloud , 2012, CCSW '12.
[34] Bettina Kemme,et al. How consistent is your cloud application? , 2012, SoCC '12.
[35] Reihaneh Safavi-Naini,et al. LoSt: location based storage , 2012, CCSW '12.
[36] Dennis Shasha,et al. Secure Untrusted Data Repository (SUNDR) , 2004, OSDI.
[37] Salman Baset,et al. Cloud SLAs: present and future , 2012, OPSR.
[38] Martin Gilje Jaatun,et al. Expressing Cloud Security Requirements in Deontic Contract Languages , 2012, CLOSER.
[39] Ari Juels,et al. Proofs of retrievability: theory and implementation , 2009, CCSW '09.
[40] Sara Bouchenak,et al. Benchmarking Dependability of MapReduce Systems , 2012, 2012 IEEE 31st Symposium on Reliable Distributed Systems.
[41] Virgílio A. F. Almeida,et al. Capacity Planning for Web Services: Metrics, Models, and Methods , 2001 .
[42] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[43] Peter Desnoyers,et al. Scheduler Vulnerabilities and Attacks in Cloud Computing , 2011, ArXiv.
[44] Martin Gilje Jaatun,et al. Security SLAs - An Idea Whose Time Has Come? , 2012, CD-ARES.
[45] Haibo Chen,et al. CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization , 2011, SOSP.
[46] Xiaozhou Li,et al. What Consistency Does Your Key-Value Store Actually Provide? , 2010, HotDep.
[47] Marko Vukolic,et al. Robust data sharing with key-value stores , 2012, DSN.
[48] Sushil K. Prasad,et al. AzureBench: Benchmarking the Storage Services of the Azure Cloud Platform , 2012, 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum.