AmazonIA: when elasticity snaps back
暂无分享,去创建一个
[1] Paul Sanderson. How to keep your , 2002 .
[2] Emin Islam Tatli. Google Reveals Cryptographic Secrets , 2012 .
[3] James Murty,et al. Programming Amazon web services - S3, EC2, SQS, FPS, and SimpleDB: outsource your infrastructure , 2008 .
[4] J. Yan,et al. Password memorability and security: empirical results , 2004, IEEE Security & Privacy Magazine.
[5] Dimitrios Pendarakis,et al. Security audits of multi-tier virtual infrastructures in public infrastructure clouds , 2010, CCSW '10.
[6] Jinesh Varia,et al. Best Practices in Architecting Cloud Applications in the AWS Cloud , 2011 .
[7] T. Grance,et al. SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing , 2011 .
[8] Jeffrey S. Chase,et al. Secure control of portable images in a virtual computing utility , 2008, VMSec '08.
[9] Adrian Perrig,et al. Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing , 2008, USENIX Annual Technical Conference.
[10] Yanpei Chen,et al. What's New About Cloud Computing Security? , 2010 .
[11] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[12] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[13] Mahadev Satyanarayanan,et al. The Case for Content Search of VM Clouds , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.
[14] Abhi Shelat,et al. Remembrance of Data Passed: A Study of Disk Sanitization Practices , 2003, IEEE Secur. Priv..
[15] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[16] Peng Ning,et al. Always up-to-date: scalable offline patching of VM images in a compute cloud , 2010, ACSAC '10.
[17] Tatu Ylönen,et al. The Secure Shell (SSH) Protocol Architecture , 2006, RFC.
[18] James Murty,et al. Programming amazon web services , 2008 .
[19] Peng Ning,et al. Managing security of virtual machine images in a cloud environment , 2009, CCSW '09.
[20] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[21] Oskari Pirttikoski. Local Key and Certificate Storage in JDK 1 . 3 * , 2000 .
[22] Tal Garfinkel,et al. When Virtual Is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments , 2005, HotOS.
[23] Bowen Alpern,et al. Opening black boxes: using semantic information to combat virtual machine image sprawl , 2008, VEE '08.
[24] I. Traore,et al. The Impact of Google Hacking on Identity and Application Fraud , 2007, 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.
[25] Thomas Ristenpart,et al. When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography , 2010, NDSS.
[26] C. Heath. Symbian OS Platform Security , 2006 .
[27] David Molnar,et al. Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud , 2010, WEIS.
[28] Simson L. Garfinkel,et al. Automating Disk Forensic Processing with SleuthKit, XML and Python , 2009, 2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering.