Zero knowledge proofs of identity
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Security problems in the TCP/IP protocol suite
ACM SIGCOMM Computer Communication Review
"Pseudo-Random" Number Generation Within Cryptographic Algorithms: The DDS Case
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
When Virtual Is Better Than Real
HOTOS '01 Proceedings of the Eighth Workshop on Hot Topics in Operating Systems
Terra: a virtual machine-based platform for trusted computing
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Shield: vulnerability-driven network filters for preventing known vulnerability exploits
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
ReVirt: enabling intrusion analysis through virtual-machine logging and replay
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Data lifetime is a systems problem
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Virtual appliances in the collective: a road to hassle-free computing
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Temporal search: detecting hidden malware timebombs with virtual machines
Proceedings of the 12th international conference on Architectural support for programming languages and operating systems
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
Proceedings of the 1st workshop on Architectural and system support for improving software dependability
Comparison of the three CPU schedulers in Xen
ACM SIGMETRICS Performance Evaluation Review
Architecting Dependable and Secure Systems Using Virtualization
Architecting Dependable Systems V
Task-aware virtual machine scheduling for I/O performance.
Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on Virtual execution environments
VMFence: a customized intrusion prevention system in distributed virtual computing environment
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Managing security of virtual machine images in a cloud environment
Proceedings of the 2009 ACM workshop on Cloud computing security
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
A guest-transparent file integrity monitoring method in virtualization environment
Computers & Mathematics with Applications
Protecting confidential data on personal computers with storage capsules
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Patch auditing in infrastructure as a service clouds
Proceedings of the 7th ACM SIGPLAN/SIGOPS international conference on Virtual execution environments
Transparently bridging semantic gap in CPU management for virtualized environments
Journal of Parallel and Distributed Computing
An automatic intrusion diagnosis approach for clouds
International Journal of Automation and Computing
CyberGuarder: A virtualization security assurance architecture for green cloud computing
Future Generation Computer Systems
Automated information flow analysis of virtualized infrastructures
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
SOSP '11 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
SPARC: a security and privacy aware virtual machinecheckpointing mechanism
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Automated verification of virtualized infrastructures
Proceedings of the 3rd ACM workshop on Cloud computing security workshop
AmazonIA: when elasticity snaps back
Proceedings of the 18th ACM conference on Computer and communications security
Enabling secure VM-vTPM migration in private clouds
Proceedings of the 27th Annual Computer Security Applications Conference
Executing mobile applications on the cloud: Framework and issues
Computers & Mathematics with Applications
Resettable public-key encryption: how to encrypt on a virtual machine
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing
SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing
A security analysis of amazon's elastic compute cloud service
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Trends and challenges in operating systems---from parallel computing to cloud computing
Concurrency and Computation: Practice & Experience
The Cloud: Requirements for a Better Service
CCGRID '12 Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
The use of hardware virtualization in the context of information security
Programming and Computing Software
A novel intrusion severity analysis approach for Clouds
Future Generation Computer Systems
Protecting grids from cross-domain attacks using security alert sharing mechanisms
Future Generation Computer Systems
Virtualization: Issues, security threats, and solutions
ACM Computing Surveys (CSUR)
Migrating Android Applications to the Cloud
International Journal of Grid and High Performance Computing
Virtual TCP offload: optimizing ethernet overlay performance on advanced interconnects
Proceedings of the 22nd international symposium on High-performance parallel and distributed computing
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Security of public continuous integration services
Proceedings of the 9th International Symposium on Open Collaboration
A VMM-based intrusion prevention system in cloud computing environment
The Journal of Supercomputing
Hi-index | 0.00 |
As virtual machines become pervasive users will be able to create, modify and distribute new "machines" with unprecedented ease. This flexibility provides tremendous benefits for users. Unfortunately, it can also undermine many assumptions that today's relatively static security architectures rely on about the number of hosts in a system, their mobility, connectivity, patch cycle, etc. We examine a variety of security problems virtual computing environments give rise to. We then discuss potential directions for changing security architectures to adapt to these demands.