Sciweavers

392 search results - page 5 / 79
» Privacy Requirement Modeling and Verification in Cloud Compu...
Sort
View
123
Voted
ICDE
2009
IEEE
168views Database» more  ICDE 2009»
14 years 11 months ago
An Economic Model for Self-Tuned Cloud Caching
Abstract--Cloud computing, the new trend for service infrastructures requires user multi-tenancy as well as minimal capital expenditure. In a cloud that services large amounts of d...
Debabrata Dash, Verena Kantere, Anastasia Ailamaki
178
Voted
CCS
2011
ACM
14 years 1 months ago
Eliminating the hypervisor attack surface for a more secure cloud
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a l...
Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer R...
95
Voted
CCS
2010
ACM
15 years 2 months ago
On verifying stateful dataflow processing services in large-scale cloud systems
Cloud computing needs to provide integrity assurance in order to support security sensitive application services such as critical dataflow processing. In this paper, we present a ...
Juan Du, Xiaohui Gu, Ting Yu
ISI
2006
Springer
15 years 1 months ago
Computational Modeling and Experimental Validation of Aviation Security Procedures
Security of civil aviation has become a major concern in recent years, leading to a variety of protective measures related to airport and aircraft security to be established by re...
Uwe Glässer, Sarah Rastkar, Mona Vajihollahi
100
Voted
ACSAC
2010
IEEE
14 years 12 months ago
Always up-to-date: scalable offline patching of VM images in a compute cloud
Patching is a critical security service that keeps computer systems up to date and defends against security threats. Existing patching systems all require running systems. With th...
Wu Zhou, Peng Ning, Xiaolan Zhang, Glenn Ammons, R...