Author:
Maheswara Reddy Gali Adi,Koduganti Venkata Rao
Reference21 articles.
1. Y. Zhang, A. Juels, M. Reiter, T. Ristenpart, “Cross-VM Side Channels and Their Use to Extract Private Keys,” Proc. 19th ACM Conference on Computer and Communications Security (CCS 2012), pp. 305-316, 2012.
2. Y. Han, T. Alpcan, J. Chan, C. Leckie, “Security games for virtual machine allocation in cloud computing,” in 4th International Conference on Decision and Game Theory for Security, Fort Worth, TX, 2013.
3. Utility-based virtual cloud resource allocation model and algorithm in cloud computing;Jianrong;Int. J. Grid Distribut. Comput.,2015
4. Bhrugu Sevak “Security against side-channel attack in cloud computing” Int. J. Eng. Adv. Technol. (IJEAT) ISSN: 2249 – 8958, Volume-2, Issue-2, December 2012.
5. T. Ristenpart, E. Tromer, H. Shacham, S. Savage, “Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds,” in Proc. of the ACM Conference on Computer and Communications Security (CCS), Chicago, IL, 2009.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献