Domain based storage protection with secure access control for the cloud

N Paladi, A Michalas, C Gehrmann - Proceedings of the 2nd …, 2014 - dl.acm.org
Cloud computing has evolved from a promising concept to one of the fastest growing
segments of the IT industry. However, many businesses and individuals continue to view …

“One of our hosts in another country”: Challenges of data geolocation in cloud storage

N Paladi, A Michalas - 2014 4th International Conference on …, 2014 - ieeexplore.ieee.org
Physical location of data in cloud storage is an increasingly urgent problem. In a short time, it
has evolved from the concern of a few regulated businesses to an important consideration …

[PDF][PDF] 云计算环境下隐蔽信道关键问题研究

吴敬征, 丁丽萍, 王永吉 - Journal on Communications, 2011 - infocomm-journal.com
首先综述了云计算平台的发展现状, 虚拟化关键技术以及云计算安全现状; 其次综述了近40
年来隐蔽信道分析在操作系统, 数据库系统, 网络系统领域的发展与研究成果; …

Domain-based storage protection (DBSP) in public infrastructure clouds

N Paladi, C Gehrmann, F Morenius - Nordic Conference on Secure IT …, 2013 - Springer
Confidentiality and integrity of data in Infrastructure-as-a-Service (IaaS) environments
increase in relevance as adoption of IaaS advances towards maturity. While current …

Hypervisor-based background encryption

Y Omote, Y Chubachi, T Shinagawa… - Proceedings of the 27th …, 2012 - dl.acm.org
To prevent data breaches, many organizations deploy full disk encryption to their computers.
While OS-based encryption is widely accepted in practical situations, hypervisor-based …

State of The Art and Hot Aspects in Cloud Data Storage Security

N Paladi, C Gehrmann, F Morenius - 2013 - diva-portal.org
Along with the evolution of cloud computing and cloud storage towards maturity, researchers
have analyzed an increasing range of cloud computing security aspects, data security being …

Trust but verify: trust establishment mechanisms in infrastructure clouds

N Paladi - 2017 - portal.research.lu.se
In the cloud computing service model, users consume computation resources provided
through the Internet, often without any awareness of the cloud service provider that owns …

Protection des systèmes informatiques vis-à-vis des malveillances: un hyperviseur de sécurité assisté par le matériel

B Morgan - 2016 - theses.hal.science
L'utilisation des systèmes informatiques est aujourd'hui en pleine évolution. Le modèle
classique qui consiste à associer à chaque utilisateur une machine physique qu'il possède …

Virtual machine based security architecture

E Borghei, R Azmi, A Ghahremanian… - 2011 World Congress …, 2011 - ieeexplore.ieee.org
In this paper a new approach based on using reference validation mechanism to improve
system reliability is proposed. Since device drivers are the main cause of system failure, they …

Tests d'intégrité d'hyperviseurs de machines virtuelles à distance et assisté par le matériel

B Morgan, É Alata, V Nicomette - … sur la sécurité des technologies de l' …, 2014 - hal.science
Les gestionnaires de machines virtuelles (ou VMM) sont de plus en plus utilisés dans le
monde de l'informatique aujourd'hui (notamment, depuis l'engouement pour le Cloud …