Open Access
Issue |
ITM Web Conf.
Volume 11, 2017
2017 International Conference on Information Science and Technology (IST 2017)
|
|
---|---|---|
Article Number | 01001 | |
Number of page(s) | 9 | |
Section | Session I: Computational Intelligence | |
DOI | https://doi.org/10.1051/itmconf/20171101001 | |
Published online | 23 May 2017 |
- Perez R, Sailer R, van Doorn L. vTPM: virtualizing the trusted platform module[C]. Proc 15th Conf on USENIX Security Symposium; 2006; 2006. p. 305–20. [Google Scholar]
- England P, Loeser J. Para-virtualized TPM sharing[C]. Trusted Computing-Challenges and Applications: Springer; 2008: 119–32. [CrossRef] [Google Scholar]
- Stumpf F, Eckert C. Enhancing trusted platform modules with hardware-based virtualization techniques[C]. Emerging Security Information, Systems and Technologies, 2008 SECURWARE’08 Second International Conference on; 2008: IEEE; 2008. p. 1–9. [Google Scholar]
- Greve D, Wilding M, Vanfleet WM. A separation kernel formal security policy[C]. Proc Fourth International Workshop on the ACL2 Theorem Prover and Its Applications; 2003: Citeseer; 2003. [Google Scholar]
- Pauley WA. Cloud provider transparency: an empirical evaluation [J]. Security & Privacy, IEEE 2010; 8(6): 32–9. [CrossRef] [Google Scholar]
- Whaiduzzaman M, Gani A. Measuring security for cloud service provider: A Third Party approach[C]. Electrical Information and Communication Technology (EICT), 2013 International Conference on; 2014: IEEE; 2014. p. 1–6. [Google Scholar]
- Wüllenweber K, Weitzel T. An empirical exploration of how process standardization reduces outsourcing risks[C]. System Sciences, 2007 HICSS 2007 40th Annual Hawaii International Conference on; 2007: IEEE; 2007. p. 240c-c. [Google Scholar]
- Chakraborty S, Roy K. An SLA-based framework for estimating trustworthiness of a cloud[C]. Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on; 2012: IEEE; 2012. p. 937–42. [Google Scholar]
- Zadeh LA. Probability measures of fuzzy events [J]. Journal of mathematical analysis and applications 1968; 23(2): 421–7. [CrossRef] [MathSciNet] [Google Scholar]
- Shapley LS. A value for n-person games[R]: DTIC Document, 1952. [Google Scholar]
- Anderson JP. Computer Security Technology Planning Study. Volume 2[R]: DTIC Document, 1972. [Google Scholar]
- Peter Loscocco N. Integrating flexible support for security policies into the Linux operating system[C]. Proceedings of the FREENIX track: USENIX Annual Technical Conference; 2001; 2001. [Google Scholar]
- Rushby JM. Design and verification of secure systems [M]: ACM; 1981. [Google Scholar]
- Rushby J. Separation and integration in mils (the mils constitution)[J]. Computer Science Laboratory SRI International, Technical Report 2008. [Google Scholar]
- Zhang F, Chen J, Chen H, Zang B. CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization[C]. Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles; 2011: ACM; 2011. p. 203–16. [Google Scholar]
- Lie D, Thekkath C, Mitchell M, et al. Architectural support for copy and tamper resistant software [J]. ACM SIGPLAN Notices 2000; 35(11): 168–77. [CrossRef] [Google Scholar]
- Sahai A, Waters B. Fuzzy identity-based encryption[C]. Advances in Cryptology–EUROCRYPT 2005: Springer; 2005: 457–73. [Google Scholar]
- Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption[C]. Security and Privacy, 2007 SP’07 IEEE Symposium on; 2007: IEEE; 2007. p. 321–34. [Google Scholar]
- Pike R, Presotto D, Thompson K, Trickey H, Winterbottom P. The use of name spaces in Plan 9[C]. Proceedings of the 5th workshop on ACM SIGOPS European workshop: Models and paradigms for distributed systems structuring; 1992: ACM; 1992. p. 1–5. [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.