共 11 条
- [7] Process out-grafting an efficientout-of-VM approach for fine-grained process execution monitoring. Deepa Srinivasan,Zhi Wang,Xuxian Jiang,Dongyan Xu. Proceedings of the18th ACMconference on Computer and communications security . 2011
- [8] Conjunctive, subset, and range queries on encrypted data. Dan Boneh,Brent Waters. Proceedings of the4th conference on Theory of cryptography (TCC’’07) . 2007
- [9] Whispers in the hyper-space:Highspeed covert channel attacks in the cloud. Wu Z,Xu Z,Wang H. Proceedings of the21st USENIX Conference on Security Symposium . 2012
- [10] Towards trusted cloud computing. Santos, N,Gummadi, K.P,Rodrigues, R. Proceedings of the 2009 conference on Hot topics in cloud computing . 2009