Security risks and their management in cloud computing
暂无分享,去创建一个
[1] Benoit Hudzia,et al. Future Generation Computer Systems Optimis: a Holistic Approach to Cloud Service Provisioning , 2022 .
[2] Nils Gruschka,et al. Attack Surfaces: A Taxonomy for Attacks on Cloud Services , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[3] Johan Tordsson,et al. Towards Secure Cloud Bursting, Brokerage and Aggregation , 2010, 2010 Eighth IEEE European Conference on Web Services.
[4] Christopher Krügel,et al. Detecting kernel-level rootkits through binary analysis , 2004, 20th Annual Computer Security Applications Conference.
[5] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[6] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[7] Ed Skoudis,et al. Hiding Virtualization from Attackers and Malware , 2007, IEEE Security & Privacy.
[8] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[9] Stefan Berger,et al. Building a MAC-based security architecture for the Xen open-source hypervisor , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[10] Rajkumar Buyya,et al. Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[11] Yong Zhao,et al. Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.
[12] R. Buyya,et al. Market-Oriented Grid and Utility Computing , 2009 .
[13] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[14] Jules Desharnais,et al. Static Detection of Malicious Code in Executable Programs , 2000 .
[15] Paul Pocatilu. Cloud Computing Benefits for E-learning Solutions , 2010 .
[16] Christopher Krügel,et al. Dynamic Analysis of Malicious Code , 2006, Journal in Computer Virology.
[17] Cristina Cifuentes,et al. Intraprocedural static slicing of binary executables , 1997, 1997 Proceedings International Conference on Software Maintenance.
[18] Ben Walters,et al. QUIRC: A Quantitative Impact and Risk Assessment Framework for Cloud Security , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[19] Helen J. Wang,et al. SubVirt: implementing malware with virtual machines , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[20] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[21] Edward Ray,et al. Virtualization security , 2009, CSIIRW '09.
[22] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).