共 14 条
[1]
Stealthy malwaredetection through VMM-based"out-of-the-box"semantic view recon-struction. JIANG Xu-xian,WANG Xin-yuan,XU Dong-yan. Proc of the 14th ACM Conference on Computer andCommunication Security . 2007
[2]
Cloud security solutions using FPGA. MONDOL J A M. Proc ofIEEE Pacific Rim Conference on Communications,Computers andSignal Processing . 2011
[3]
Secure virtualization for cloud compu-ting. LOMBARDI F,Di PIETRO R. Journal of Network and Computer Applications . 2010
[4]
Cloud computing risk assessment. ENISA. ht-tp://www.enisa.europa.eu/act/rm/files/deliverables . 2009
[5]
Trusting the cloud. CACHIN C,KEIDAR I,SHRAER A. SI-GACT News . 2009
[6]
Taking account of privacy when designing cloudcomputing Services. PEARSON S,LABS H. P,BRISTOL U. K. ICSE2009: proceedings of the2009ICSE Workshop on SoftwareEngineering Challenges of Cloud Computing . 2009
[7]
Windows Malicious Software Removal Tool. Microsoft. http://www.microsoft .com/security/malwareremove/ . 2007
[8]
AntFarm:Tracking processes in a virtual machine environment. Jones S,Arpaci-Dusseau A,Arpaci-Dusseau R. Proc of Annual USENIX Technical Conf . 2008
[9]
FUTo uninformed[EB OL]. Silberman P,et al. http:uninformed.org v=3&a=7&t=sumry . 2006