Author:
Jarraya Yosr,Eghtesadi Arash,Debbabi Mourad,Zhang Ying,Pourzandi Makan
Publisher
Springer Berlin Heidelberg
Reference19 articles.
1. Malcolm, D.: The Five Pillars of Cloud Computing (2009),
http://soa.sys-con.com/node/904780
; SOA & WOA magazine, Cloud Expo article (last visited, April 2012)
2. Jarraya, Y., Eghtesadi, A., Debbabi, M., Zhang, Y., Pourzandi, M.: Cloud calculus: Security verification in elastic cloud computing platform. In: The Proceeding of the 2012 International Conference on Collaboration Technologies and Systems (CTS), pp. 447–454. IEEE (2012)
3. Biere, A., Cimatti, A., Clarke, E.M., Strichman, O., Zhu, Y.: Bounded Model Checking. Advances in Computers, vol. 58, pp. 117–148. Elsevier (2003)
4. Jeffrey, A., Samak, T.: Model Checking Firewall Policy Configurations. In: IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2009, pp. 60–67 (July 2009)
5. Tamura, N., Banbara, M.: Sugar: A CSP to SAT Translator Based on Order Encoding. In: The Proceedings of the Second International CSP Solver Competition, pp. 65–69 (2008)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Exploring the Firewall Security Consistency in Cloud Computing during Live Migration;Proceedings of the 7th International Conference on Computing Communication and Networking Technologies;2016-07-06
2. Verification of firewall reconfiguration for virtual machines migrations in the cloud;Computer Networks;2015-12
3. Formal Security Framework for Agent Based Cloud Systems;2014 International Workshop on Advanced Information Systems for Enterprises;2014-11
4. Preservation of Security Configurations in the Cloud;2014 IEEE International Conference on Cloud Engineering;2014-03