MAC protection of the OpenNebula Cloud environment
暂无分享,去创建一个
Jonathan Rouzaud-Cornabas | Aline Bousquet | Jérémy Briffaut | Christian Toinard | Zaïna Afoulki | Zaina Afoulki | Aline Bousquet | Jérémy Briffaut | C. Toinard | J. Rouzaud-Cornabas
[1] Ravi S. Sandhu,et al. Towards a discipline of mission-aware cloud computing , 2010, CCSW '10.
[2] Trent Jaeger,et al. Analysis of virtual machine system policies , 2009, SACMAT '09.
[3] Stephen Smalley,et al. Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.
[4] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[5] Wenke Lee,et al. A layered approach to simplified access control in virtualized systems , 2007, OPSR.
[6] Jonathan Rouzaud-Cornabas,et al. PIGA-Virt: An Advanced Distributed MAC Protection of Virtual Systems , 2011, Euro-Par Workshops.
[7] Luis Miguel Vaquero Gonzalez,et al. Locking the sky: a survey on IaaS cloud security , 2010, Computing.
[8] Peng Ning,et al. SICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms , 2011, CCS '11.
[9] Siani Pearson,et al. Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[10] Trent Jaeger,et al. An architecture for enforcing end-to-end access control over web applications , 2010, SACMAT '10.
[11] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[12] Haibo Chen,et al. CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization , 2011, SOSP.
[13] Trent Jaeger,et al. Outlook: Cloudy with a Chance of Security Challenges and Improvements , 2010, IEEE Security & Privacy.