Author:
Dammoju Vamshi Krishna,Samba Sivudu M.,Jayapal M.,Shanthi S.
Publisher
Springer Nature Singapore
Reference5 articles.
1. Khan, I., Anwar, Z., Bordbar, B., Ritter, E., Rehman, H.: A protocol for preventing insider attacks in untrusted infrastructure-as-a-service clouds. IEEE Trans. Cloud Comput. 6(4), 942–954 (2018)
2. Gunasekhar, T., Thirupathi Rao, K.: Framework for prevention of insider attacks in cloud infrastructure through hardware security. J. Adv. Res. Dyn. Control Syst. 9(4) (2017)
3. McCune, J.M., Parno, B.J., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: an execution infrastructure for TCB minimization. ACM SIGOPS Oper. Syst. Rev. 42, 4 (2008)
4. Nurmi, D., Wolski, R., Grzegorczyk, C., Obertelli, G., Soman, S., Youseff, L., et al.: The eucalyptus open source cloud computing system. In: Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid (2009)
5. AMD64 Virtualization: Secure Virtual Machine Architecture Reference Manual, AMD Publication, no. 33047, May 2005