Secure Virtualization for Cloud Environment Using Hypervisor-based Technology
暂无分享,去创建一个
[1] Nancy R. Mead,et al. Security quality requirements engineering (SQUARE) methodology , 2005, SESS@ICSE.
[2] Farzad Sabahi. Intrusion Detection Techniques Performance in Cloud Environments , 2011 .
[3] Nancy R. Mead,et al. Security quality requirements engineering (SQUARE) methodology , 2005, SESS@ICSE.
[4] David E. Y. Sarna,et al. Implementing and Developing Cloud Computing Applications , 2010 .
[5] Lionel Litty,et al. Hypervisor-based Intrusion Detection , 2005 .
[6] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[7] W. Marsden. I and J , 2012 .
[8] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.