Cited By
View all- Bates ATian DButler KMoyer T(2015)Trustworthy whole-system provenance for the Linux kernelProceedings of the 24th USENIX Conference on Security Symposium10.5555/2831143.2831164(319-334)Online publication date: 12-Aug-2015
- Civilini MVillari MBrandic ITusa F(2012)The Security of Cloud InfrastructureAchieving Federated and Self-Manageable Cloud Infrastructures10.4018/978-1-4666-1631-8.ch009(158-175)Online publication date: 2012
- Bilski T(2012)IP Storage Security AnalysisComputer Networks10.1007/978-3-642-31217-5_24(216-228)Online publication date: 2012
- Show More Cited By