Security and trust preserving inter‐ and intra‐cloud VM migrations
暂无分享,去创建一个
[1] Carsten Schürmann,et al. Towards a Mechanized Proof of Selene Receipt-Freeness and Vote-Privacy , 2017, E-VOTE-ID.
[2] Andy Hopper,et al. Predicting the Performance of Virtual Machine Migration , 2010, 2010 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.
[3] Trent Jaeger,et al. Verifying System Integrity by Proxy , 2012, TRUST.
[4] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[5] David A. Basin,et al. Alethea: A Provably Secure Random Sample Voting Protocol , 2018, 2018 IEEE 31st Computer Security Foundations Symposium (CSF).
[6] Joint Task Force Transformation Initiative,et al. Security and Privacy Controls for Federal Information Systems and Organizations , 2013 .
[7] Mats Björkman,et al. Security and Trust Preserving VM Migrations in Public Clouds , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[8] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[9] Trent Jaeger,et al. Seeding clouds with trust anchors , 2010, CCSW '10.
[10] Ghassan O. Karame,et al. Enabling secure VM-vTPM migration in private clouds , 2011, ACSAC '11.
[11] Ralf Sasse,et al. A Formal Analysis of 5G Authentication , 2018, CCS.
[12] Ahmad-Reza Sadeghi,et al. Property-based attestation for computing platforms: caring about properties, not mechanisms , 2004, NSPW '04.
[13] Kenneth A. Goldman,et al. A Practical Guide to TPM 2.0 , 2015, Apress.
[14] Patrick Howard. FISMA Principles and Best Practices: Beyond Compliance , 2011 .
[15] David A. Basin,et al. The TAMARIN Prover for the Symbolic Analysis of Security Protocols , 2013, CAV.
[16] Michael Franz,et al. Awarded Best Paper! Semantic Remote Attestation - Virtual Machine Directed Approach to Trusted Computing , 2004, Virtual Machine Research and Technology Symposium.
[17] Haibo Chen,et al. Daonity - Grid security from two levels of virtualization , 2007, Inf. Secur. Tech. Rep..
[18] Larry Feldman,et al. Release of NIST Special Publication 800-53A, Revision 4, Assessing Security and Privacy Controls in Federal Information Systems and Organizations | NIST , 2015 .
[19] Antonio Puliafito,et al. A Remote Attestation Approach for a Secure Virtual Machine Migration in Federated Cloud Environments , 2011, 2011 First International Symposium on Network Cloud Computing and Applications.
[20] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[21] Ahmad-Reza Sadeghi,et al. A protocol for property-based attestation , 2006, STC '06.
[22] Basel Katt,et al. Quantitative security assurance metrics: REST API case studies , 2018, ECSA.
[23] Wei Lu,et al. MalwareTextDB: A Database for Annotated Malware Articles , 2017, ACL.
[24] Haibo Chen,et al. PALM: Security Preserving VM Live Migration for Systems with VMM-enforced Protection , 2008, 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference.
[25] Cas J. F. Cremers,et al. A Comprehensive Symbolic Analysis of TLS 1.3 , 2017, CCS.