An Optimized Approach to Protect Virtual Machine Image Integrity in Cloud Computing
暂无分享,去创建一个
Limin Xiao | Rui Liu | Li Ruan | Zhigang Xu | Xichun Yue | Weidian Zhan
[1] Shashank Srivastava,et al. An approach for virtual machine image security , 2014, 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT 2014).
[2] Peng Ning,et al. Managing security of virtual machine images in a cloud environment , 2009, CCSW '09.
[3] Muhammad Awais Shibli,et al. Securing the virtual machine images in cloud computing , 2013, SIN.
[4] Nicolae Paladi,et al. Trusted Launch of Generic Virtual Machine Images in Public IaaS Environments , 2012 .
[5] Peng Ning,et al. Always up-to-date: scalable offline patching of VM images in a compute cloud , 2010, ACSAC '10.
[6] Donald E. Eastlake,et al. US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.
[7] A. Zahariev. Google App Engine , 2009 .