M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. A view of cloud computing. Communications of the ACM, 53(4):50-58, April 2010.
P. Barham, B. Dragovic, K. Fraiser, S. Hand, T. Harris, A. Ho, R. Neugebaurer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, pages 164-177, October 2003. (Pubitemid 40929695)
S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn. vTPM: Virtualizing the trusted platform module. In Proceedings of the 15th USENIX Security Symposium, pages 305-320, August 2006.
A. Bessani, M. Correia, B. Quaresma, F. André, and P. Sousa. DepSky: Dependable and secure storage in a cloud-of-clouds. In Proceedings of the European Conference on Computer Systems (EuroSys), pages 31-46, April 2011.
Cloud Security Alliance. Top threats to cloud computing v1.0, March 2010.
S. Davidoff. Cleartext passwords in Linux memory. http://philosecurity. org/pubs/davidoff-clearmem-linux.pdf, July 2008.
C. Gentry. Fully homomorphic encryption using ideal lattices. In Proceedings of the 41st Annual ACM Symposium on Theory of Computing, pages 169-178, 2009.
E. Grosse, J. Howie, J. Ransome, J. Reavis, and S. Schmidt. Cloud computing roundtable. IEEE Security Privacy, 8(6):17-23, 2010.
J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten. Lest we remember: Cold boot attacks on encryption keys. In Proceedings of the 17th USENIX Security Symposium, pages 45-60, August 2008.
F. J. Krautheim. Private virtual infrastructure for cloud computing. In Proceedings of the Workshop on Hot Topics in Cloud Computing, June 2009.
P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The inevitability of failure: The flawed assumption of security in modern computing environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303-314, 1998.
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. TrustVisor: Efficient TCB reduction and attestation. In Proceedings of the IEEE Symposium on Security and Privacy, pages 143-158, May 2010.
P. Mell and T. Grance. The NIST definition of cloud computing, July 2009.
D. G. Murray, G. Milos, and S. Hand. Improving Xen security through disaggregation. In Proceedings of the 4th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, pages 151-160, 2008.
D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov. The Eucalyptus opensource cloud-computing system. In Proceedings of the IEEE International Symposium on Cluster Computing and the Grid, pages 124-131, 2009.
M. Rosenblum and T. Garfinkel. Virtual machine monitors: Current technology and future trends. IEEE Computer, 38(5):39-47, May 2005. (Pubitemid 40784341)
N. Santos, K.P. Gummadi, and R. Rodrigues. Towards trusted cloud computing. In Proceedings of the Workshop on Hot Topics in Cloud Computing, June 2009.
Trusted Computing Group. Trusted computing platform module main specification. version 1.2, revision 94. http://www.trustedcomputinggroup.org, 2006.
M. van Dijk and A. Juels. On the impossibility of cryptography alone for privacy-preserving cloud computing. In Proceedings of the 5th USENIX Conference on Hot Topics in Security, pages 1-8, 2010.
A. Vasudevan, J. M. McCune, N. Qu, L. van Doorn, and A. Perrig. Requirements for an integrity-protected hypervisor on the x86 hardware virtualized architecture. In Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, pages 141-165, June 2010.