{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T10:49:52Z","timestamp":1725878992117},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319474724"},{"type":"electronic","value":"9783319474748"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-47474-8_21","type":"book-chapter","created":{"date-parts":[[2017,1,23]],"date-time":"2017-01-23T05:32:38Z","timestamp":1485149558000},"page":"611-631","source":"Crossref","is-referenced-by-count":1,"title":["Software Architectures for Self-protection in IaaS Clouds"],"prefix":"10.1007","author":[{"given":"K. R.","family":"Jayaram","sequence":"first","affiliation":[]},{"given":"Aleksandar","family":"Milenkoski","sequence":"additional","affiliation":[]},{"given":"Samuel","family":"Kounev","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,24]]},"reference":[{"key":"21_CR1","unstructured":"Stefan Berger, Ram\u00f3n C\u00e1ceres, Kenneth\u00a0A. Goldman, Ronald Perez, Reiner Sailer, and Leendert van Doorn. vtpm: Virtualizing the trusted platform module. In Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15, USENIX-SS\u201906, Berkeley, CA, USA, 2006. USENIX Association."},{"key":"21_CR2","unstructured":"EU Framework 7 \u2013 TClouds Project. Trustworthy Clouds Privacy and Resilience for Internet-scale Critical Infrastructure, 2013. http:\/\/www.tclouds-project.eu\/index.php\/published-results\/public-deliverables ."},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"W.\u00a0Futral and J.\u00a0Greene. Intel Trusted Execution Technology for Server Platforms, 2014. http:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/white-papers\/trusted-execution-technology-security-paper.pdf .","DOI":"10.1007\/978-1-4302-6149-0"},{"key":"21_CR4","unstructured":"Benjamin Hindman, Andy Konwinski, Matei Zaharia, Ali Ghodsi, Anthony\u00a0D. Joseph, Randy Katz, Scott Shenker, and Ion Stoica. Mesos: A platform for fine-grained resource sharing in the data center. In Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation, NSDI\u201911, pages 295\u2013308, Berkeley, CA, USA, 2011. USENIX Association."},{"key":"21_CR5","unstructured":"OpenStack. OpenStack Architecture, 2014. http:\/\/docs.openstack.org\/training-guides\/content\/module001-ch004-openstack-architecture.html ."},{"key":"21_CR6","unstructured":"OpenStack. Nova Developer Documentation, 2014. http:\/\/docs.openstack.org\/developer\/nova\/ ."},{"key":"21_CR7","unstructured":"Reiner Sailer, Xiaolan Zhang, Trent Jaeger, and Leendert van Doorn. Design and implementation of a tcg-based integrity measurement architecture. In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13, SSYM\u201904, pages 16\u201316, Berkeley, CA, USA, 2004. USENIX Association."},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Malte Schwarzkopf, Andy Konwinski, Michael Abd-El-Malek, and John Wilkes. Omega: Flexible, scalable schedulers for large compute clusters. In Proceedings of the 8th ACM European Conference on Computer Systems, EuroSys \u201913, pages 351\u2013364, New York, NY, USA, 2013. ACM.","DOI":"10.1145\/2465351.2465386"},{"key":"21_CR9","unstructured":"Trusted Computing Group. Trusted Boot, 2014. http:\/\/www.trustedcomputinggroup.org\/resources\/trusted_boot ."},{"key":"21_CR10","unstructured":"Trusted\u00a0Computing\u00a0Group. Trusted Computing Group Web Portal, 2014. http:\/\/www.trustedcomputinggroup.org ."},{"key":"21_CR11","unstructured":"Trusted\u00a0Computing\u00a0Group. Trusted Platform Module Specification, 2014. http:\/\/www.trustedcomputinggroup.org\/resources\/tpm_main_specification ."},{"key":"21_CR12","unstructured":"R.\u00a0Wilkins and B.\u00a0Richardson. UEFI Secure Boot in Modern Computer Security Solutions, 2013. http:\/\/www.uefi.org\/sites\/default\/files\/resources\/UEFI_Secure_Boot_in_Modern_Computer_Security_Solutions_2013.pdf ."},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"R.\u00a0Yeluri and E.\u00a0Castro-Leon. Building the Infrastructure for Cloud Security A Solutions View. Apress Inc., 2014.","DOI":"10.1007\/978-1-4302-6146-9"}],"container-title":["Self-Aware Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47474-8_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T21:30:45Z","timestamp":1568755845000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47474-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319474724","9783319474748"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47474-8_21","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}