{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T08:16:26Z","timestamp":1761293786929,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3230860","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Flashlight"],"prefix":"10.1145","author":[{"given":"Heng","family":"Zhang","sequence":"first","affiliation":[{"name":"Technischen Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Jesus","family":"Luna","sequence":"additional","affiliation":[{"name":"Technischen Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Neeraj","family":"Suri","sequence":"additional","affiliation":[{"name":"Technischen Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Ruben","family":"Trapero","sequence":"additional","affiliation":[{"name":"Atos Research &amp; Innovation, Madrid, Spain"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"487","article-title":"Fast algorithms for mining association rules","volume":"1215","author":"Agrawal R.","year":"1994","unstructured":"Agrawal R. , 1994 . Fast algorithms for mining association rules . In VLDB , Vol. 1215. 487 -- 499 . Agrawal R., et al. 1994. Fast algorithms for mining association rules. In VLDB, Vol. 1215. 487--499.","journal-title":"VLDB"},{"volume-title":"Efficient detection of distributed constraint violations","author":"Agrawal S.","key":"e_1_3_2_1_2_1","unstructured":"Agrawal S. , Efficient detection of distributed constraint violations . In ICDE. IEEE , 1320--1324. Agrawal S., et al. 2007. Efficient detection of distributed constraint violations. In ICDE. IEEE, 1320--1324."},{"key":"e_1_3_2_1_3_1","unstructured":"Amazon. 2017. List the Available CloudWatch Metrics for Your Instances. http:\/\/docs.aws.amazon.com\/AWSEC2\/latest\/UserGuide\/viewing_metrics_with_cloudwatch.html. (2017). {Online}.  Amazon. 2017. List the Available CloudWatch Metrics for Your Instances. http:\/\/docs.aws.amazon.com\/AWSEC2\/latest\/UserGuide\/viewing_metrics_with_cloudwatch.html. (2017). {Online}."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046766"},{"volume-title":"Who is touching my cloud","author":"Deng H.","key":"e_1_3_2_1_5_1","unstructured":"Deng H. , Who is touching my cloud . In ESORICS. Springer , 362--379. Deng H., et al. 2014. Who is touching my cloud. In ESORICS. Springer, 362--379."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2748143.2748382"},{"key":"e_1_3_2_1_7_1","first-page":"510","article-title":"Fragmentation in presence of data dependencies","volume":"11","author":"di Vimercati S.","year":"2014","unstructured":"di Vimercati S. , 2014 . Fragmentation in presence of data dependencies . TDSC 11 , 6 (2014), 510 -- 523 . di Vimercati S., et al. 2014. Fragmentation in presence of data dependencies. TDSC 11, 6 (2014), 510--523.","journal-title":"TDSC"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Dierks T and Allen C. 1999. The TLS Protocol Version 1.0. https:\/\/www.ietf.org\/rfc\/rfc2246.txt. (1999). {Online}.  Dierks T and Allen C. 1999. The TLS Protocol Version 1.0. https:\/\/www.ietf.org\/rfc\/rfc2246.txt. (1999). {Online}.","DOI":"10.17487\/rfc2246"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866393"},{"volume-title":"Measurement data reduction through variation rate metering","author":"Giuseppe B.","key":"e_1_3_2_1_10_1","unstructured":"Giuseppe B. , Measurement data reduction through variation rate metering . In INFOCOM. IEEE , 1--9. Giuseppe B., et al. 2010. Measurement data reduction through variation rate metering. In INFOCOM. IEEE, 1--9."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.22"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.22"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978330"},{"volume-title":"An approach for analysing the propagation of data errors in software","author":"Hiller M.","key":"e_1_3_2_1_14_1","unstructured":"Hiller M. , An approach for analysing the propagation of data errors in software . In DSN. IEEE , 161--170. Hiller M., et al. 2001. An approach for analysing the propagation of data errors in software. In DSN. IEEE, 161--170."},{"volume-title":"BigData","author":"Liu C.","key":"e_1_3_2_1_15_1","unstructured":"Liu C. , Path knowledge discovery: Association mining based on multi-category lexicons . In BigData . IEEE , 1049--1059. Liu C., et al. 2014. Path knowledge discovery: Association mining based on multi-category lexicons. In BigData. IEEE, 1049--1059."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.165"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.13"},{"volume-title":"Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud","author":"Ning J.","key":"e_1_3_2_1_18_1","unstructured":"Ning J. , Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud . In ESORICS. Springer , 270--289. Ning J., et al. 2015. Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud. In ESORICS. Springer, 270--289."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586144"},{"key":"e_1_3_2_1_20_1","first-page":"1","article-title":"Announcing the advanced encryption standard (AES)","volume":"197","author":"NIST.","year":"2001","unstructured":"NIST. 2001 . Announcing the advanced encryption standard (AES) . Federal Information Processing Standards Publication 197 (2001), 1 -- 51 . NIST. 2001. Announcing the advanced encryption standard (AES). Federal Information Processing Standards Publication 197 (2001), 1--51.","journal-title":"Federal Information Processing Standards Publication"},{"key":"e_1_3_2_1_21_1","unstructured":"NVD. 2014. CVE-2014-0160. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2014-0160. (2014). {Online}.  NVD. 2014. CVE-2014-0160. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2014-0160. (2014). {Online}."},{"key":"e_1_3_2_1_22_1","unstructured":"NVD. 2017. CVE-2017-7494. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-7494. (2017). {Online}.  NVD. 2017. CVE-2017-7494. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-7494. (2017). {Online}."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813680"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.14778\/2794367.2794377"},{"key":"e_1_3_2_1_25_1","first-page":"107","article-title":"AppInsight: Mobile App Performance Monitoring in the Wild","volume":"12","author":"Ravindranath L.","year":"2012","unstructured":"Ravindranath L. , 2012 . AppInsight: Mobile App Performance Monitoring in the Wild . In OSDI , Vol. 12. 107 -- 120 . Ravindranath L., et al. 2012. AppInsight: Mobile App Performance Monitoring in the Wild. In OSDI, Vol. 12. 107--120.","journal-title":"OSDI"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_28_1","unstructured":"Rodriguez M. and Neubauer P. 2010. The graph traversal pattern. arXiv preprint arXiv:1004.1001 (2010).  Rodriguez M. and Neubauer P. 2010. The graph traversal pattern. arXiv preprint arXiv:1004.1001 (2010)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670979.2671007"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2010.31"},{"key":"e_1_3_2_1_31_1","volume-title":"Indirect association: Mining higher order dependencies in data. Principles of Data Mining and Knowledge Discovery","author":"Tan P.","year":"2000","unstructured":"Tan P. , Indirect association: Mining higher order dependencies in data. Principles of Data Mining and Knowledge Discovery ( 2000 ), 212--237. Tan P., et al. 2000. Indirect association: Mining higher order dependencies in data. Principles of Data Mining and Knowledge Discovery (2000), 212--237."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382228"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714613"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575300"},{"key":"e_1_3_2_1_35_1","volume-title":"Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud. In USENIX Security symposium. 159--173","author":"Wu Z.","year":"2012","unstructured":"Wu Z. , 2012 . Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud. In USENIX Security symposium. 159--173 . Wu Z., et al. 2012. Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud. In USENIX Security symposium. 159--173."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978378"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670979.2671005"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.54"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590309"},{"volume-title":"deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services","author":"Zhang H.","key":"e_1_3_2_1_40_1","unstructured":"Zhang H. , deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services . In SCC. IEEE , 27--34. Zhang H., et al. 2017. deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services. In SCC. IEEE, 27--34."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660356"}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"],"location":"Hamburg Germany","acronym":"ARES 2018"},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3230860","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3230860","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:50Z","timestamp":1750212470000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3230860"}},"subtitle":["A Novel Monitoring Path Identification Schema for Securing Cloud Services"],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":41,"alternative-id":["10.1145\/3230833.3230860","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3230860","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}