{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T04:08:44Z","timestamp":1750392524844,"version":"3.41.0"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319596075"},{"type":"electronic","value":"9783319596082"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59608-2_18","type":"book-chapter","created":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T15:29:56Z","timestamp":1497367796000},"page":"307-316","source":"Crossref","is-referenced-by-count":0,"title":["Architecture Support for Controllable VMI on Untrusted Cloud"],"prefix":"10.1007","author":[{"given":"Jiangyong","family":"Shi","sequence":"first","affiliation":[]},{"given":"Yuexiang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,14]]},"reference":[{"key":"18_CR1","unstructured":"Garfinkel, T., Rosenblum, M., et al.: A virtual machine introspection based architecture for intrusion detection. In: NDSS, vol. 3, pp. 191\u2013206 (2003)"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Yao, F., Campbell, R.H.: CryptVMI: encrypted virtual machine introspection in the cloud. In: 2014 IEEE 7th International Conference on Cloud Computing (CLOUD), pp. 977\u2013978. IEEE (2014)","DOI":"10.1109\/CLOUD.2014.149"},{"key":"18_CR3","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/978-1-4614-9278-8_3","volume-title":"Secure Cloud Computing","author":"J Szefer","year":"2014","unstructured":"Szefer, J., Lee, R.B.: Hardware-enhanced security for cloud computing. In: Jajodia, S., Kant, K., Samarati, P., Singhal, A., Swarup, V., Wang, C. (eds.) Secure Cloud Computing, pp. 57\u201376. Springer, Heidelberg (2014)"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Xia, Y., Liu, Y., Chen, H.: Architecture support for guest-transparent vm protection from untrusted hypervisor and physical attacks. In: 2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA2013), pp. 246\u2013257. IEEE (2013)","DOI":"10.1109\/HPCA.2013.6522323"},{"key":"18_CR5","unstructured":"Anati, I., Gueron, S., Johnson, S., Scarlata, V.: Innovative technology for CPU based attestation and sealing. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, p. 10 (2013)"},{"key":"18_CR6","unstructured":"Baumann, A., Peinado, M., Hunt, G.: Shielding applications from an untrusted cloud with haven. In: USENIX Symposium on Operating Systems Design and Implementation (OSDI) (2014)"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Schuster, F., Costa, M., Fournet, C., Gkantsidis, C., Peinado, M., Mainar-Ruiz, G., Russinovich, M.: VC3: Trustworthy data analytics in the cloud using SGX (2015)","DOI":"10.1109\/SP.2015.10"},{"key":"18_CR8","unstructured":"Dinh, A., Saxena, P., Chang, E.-C., Ooi, B.C., Zhang, C.: M2R: Enabling stronger privacy in mapreduce computation. In: 24th USENIX Security Symposium (USENIX Security 2015), Washington, DC (2015)"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Shi, J., Yang, Y., Li, C.: A disjunctive VMI model based on XSM. In: The Fifth International Symposium on Cloud and Service Computing (2015)","DOI":"10.1109\/SmartCity.2015.188"},{"key":"18_CR10","unstructured":"Gueron, S.: A memory encryption engine suitable for general purpose processors, Cryptology ePrint Archive, Report 2016\/204 (2016). http:\/\/eprint.iacr.org\/2016\/204"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59608-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T14:53:06Z","timestamp":1750344786000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59608-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319596075","9783319596082"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59608-2_18","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}