Database Reference
In-Depth Information
26. Open Cloud Consortium. Open cloud manifesto. The Open Cloud Manifesto Consortium ,
2009.
27. Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. Hey, you, get
off of my cloud: Exploring information leakage in third-party compute clouds. In
Proceedings of the 16th ACM Conference on Computer and Communications Security ,
ACM CCS'09, pages 199-212, New York, 2009. ACM.
28. Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vitaly Shmatikov, and Emmett Witchel.
Airavat: Security and privacy for MapReduce. In Proceedings of the 7th USENIX
Conference on Networked Systems Design and Implementation , NSDI'10, pages 297-312,
Berkeley, CA, 2010. USENIX Association.
29. Salesforce. Social Enterprise and CRM in the cloud—salesforce.com. http://www.sales
force.com/, 2012. [Accessed July 5, 2012.]
30. Nuno Santos, Krishna P. Gummadi, and Rodrigo Rodrigues. Towards trusted cloud
computing. In Proceedings of the 2009 Conference on Hot Topics in Cloud Computing ,
Hotcloud'09, Berkeley, CA, USA, 2009. USENIX Association.
31. Nuno Santos, Rodrigo Rodrigues, Krishna P Gummadi, and Stefan Saroiu. Policy-
sealed data: A new abstraction for building trusted cloud services. In Usenix Security ,
2012.
32. Vyas Sekar and Petros Maniatis. Verifiable resource accounting for cloud comput-
ing services. In Proceedings of the 3rd ACM Workshop on Cloud Computing Security
Workshop , CCSW'11, pages 21-26, New York, 2011. ACM.
33. Fengzhe Zhang, Jin Chen, Haibo Chen, and Binyu Zang. Cloudvisor: Retrofitting pro-
tection of virtual machines in multi-tenant cloud with nested virtualization. In Proceed-
ings of the Twenty-Third ACM Symposium on Operating Systems Principles , pages
203-216. ACM, 2011.
34. Yinqian Zhang, Ari Juels, Michael K. Reiter, and Thomas Ristenpart. Cross-vm side
channels and their use to extract private keys. In ACM Conference on Computer and
Communications Security , pages 305-316, 2012.
Search WWH ::




Custom Search