共 16 条
[1]
Almeshekah M. H., 2015, P 31 COMPUTER SECURI, P311
[2]
Anati Ittai, 2013, P 2 INT WORKSH HARDW, V13
[3]
[Anonymous], 2017, INT S CLUST CLOUD GR
[4]
[Anonymous], 2015, MAN CLOUD MITC ATT
[5]
Shielding Applications from an Untrusted Cloud with Haven
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2015, 33 (03)
[6]
Beekman J., 2016, UCBEECS201612
[7]
Bhargav-Spantzel Abhilasha, 2014, Intel Technology Journal, V18
[8]
Brickell Ernie, 2011, International Journal of Information Privacy, Security and Integrity, V1, P3
[9]
George P, 2004, SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, P25
[10]
Hoekstra M., 2013, HASP@ ISCA, V11, DOI 10.1145/