[1] |
BOUCHé J , KAPPES M , . Attacking the cloud from an insider perspective[C]// Internet Technologies and Applications (ITA). 2015: 175-180.
|
[2] |
ROCHA F , CORREIA M . Lucy in the sky without diamonds:Stealing confidential data in the cloud[C]// 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W). 2011: 129-134.
|
[3] |
[EB/OL]..
|
[4] |
[EB/OL]..
|
[5] |
[EB/OL]..
|
[6] |
[EB/OL]..
|
[7] |
[EB/OL]..
|
[8] |
[EB/OL]..
|
[9] |
BHATT S , MANADHATA P K , ZOMLOT L . The operational role of security information and event management systems[J]. IEEE Security & Privacy, 2014,12(5): 35-41.
|
[10] |
YEN T F , OPREA A , ONARLIOGLU K ,et al. Beehive:large-scale log analysis for detecting suspicious activity in enterprise networks[C]// The 29th Annual Computer Security Applications Conference. 2013: 199-208.
|
[11] |
ZOMLOT L , SUNDARAMURTHY S C , LUO K ,et al. Prioritizing intrusion analysis using dempster-shafer theory[C]// The 4th ACM Workshop on Security and Artificial Intelligence. 2011: 59-70.
|
[12] |
ZHAI Y , NING P , IYER P ,et al. Reasoning about complementary intrusion evidence[C]// The 20th Computer Security Applications. 2004: 39-48.
|
[13] |
[EB/OL]..
|
[14] |
[EB/OL]..
|
[15] |
[EB/OL]..
|
[16] |
[EB/OL]..
|
[17] |
[EB/OL]..
|
[18] |
[EB/OL]..
|
[19] |
BUTT S,LAGAR-CAVILLA H A , SRIVASTAVA A , et al . Self-service cloud computing[C]// The 2012 ACM Conference on Computer and Communications Security. 2012: 253-264.
|
[20] |
ZHANG F , CHEN J , CHEN H ,et al. CloudVisor:retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization[C]// The 23rd ACM Symposium on Operating Systems Principles. 2011: 203-216.
|
[21] |
CHEN X , GARFINKEL T , LEWIS E C ,et al. Overshadow:a virtualization-based approach to retrofitting protection in commodity operating systems[C]// ACM Sigarch Computer Architecture News. 2008,36(1): 2-13.
|
[22] |
HOFMANN O S , KIM S , DUNN A M ,et al. Inktag:secure applications on an untrusted operating system[C]// ACM Sigarch Computer Architecture News. 2013,41(1): 265-278.
|
[23] |
HE W , AKHAWE D , JAIN S ,et al. Shadowcrypt:encrypted web applications for everyone[C]// The 2014 ACM Sigsac Conference on Computer and Communications Security. 2014: 1028-1039.
|
[24] |
LAU B , CHUNG S , SONG C ,et al. Mimesis aegis:a mimicry privacy shield——a system’s approach to data privacy on public cloud[C]// The 23rd USENIX Security Symposium (USENIX Security 14). 2014: 33-48.
|
[25] |
POPA R A , STARK E , VALDEZ S ,et al. Building Web applications on top of encrypted data using Mylar[C]// The 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14). 2014: 157-172.
|
[26] |
[EB/OL]..
|
[27] |
POPA R A , REDFIELD C , ZELDOVICH N ,et al. CryptDB:protecting confidentiality with encrypted query processing[C]// The 12rd ACM Symposium on Operating Systems Principles. 2011: 85-100.
|
[28] |
[EB/OL]..
|
[29] |
[EB/OL]..
|