F. Schmuck and R. Haskin, GPFS: A Shared-disk File System For Large Computing Clusters, Proc. File and Storage Technologies, 2002.

A. Kivity, Y. Kamay, D. Laor, U. Lublin, and A. Liguori, kvm: the Linux Virtual Machine Monitor, Proc. Linux Symposium, 2007.

H. Cai, B. Reinwald, N. Wang, and C. Guo, SaaS Multi-Tenancy: Framework, Technology, and Case Study, International Journal of Cloud Applications and Computing (IJCAC), vol.1, issue.1, 2011.
DOI : 10.4018/ijcac.2011010105

A. Traeger, A. Rai, C. Wright, and E. Zadok, NFS File Handle Security, tech. rep, 2004.

S. Oehme, J. Deicke, J. Akelbein, R. Sahlberg, A. Tridgell et al., IBM Scale out File Services: Reinventing network-attached storage, IBM Journal of Research and Development, vol.52, issue.4.5, 2008.
DOI : 10.1147/rd.524.0319

S. Osman, D. Subhraveti, G. Su, and J. Nieh, The Design and Implementation of Zap: A System for Migrating Computing Environments, ACM SIGOPS Operating Systems Review, vol.36, 2002.

P. Kamp and R. Watson, Jails: Confining the omnipotent root, Proc. International System Administration and Network Engineering, 2000.

D. Price and A. Tucker, Solaris Zones: Operating System Support for Consolidating Commercial Workloads, Proc. System administration, 2004.

B. Mccarty, SELinux: NSA's Open Source Security Enhanced Linux, 2004.

S. M. Diesburg and A. A. Wang, A survey of confidential data storage and deletion methods, ACM Computing Surveys, vol.43, issue.1, 2010.
DOI : 10.1145/1824795.1824797

G. Sivathanu, C. P. Wright, and E. Zadok, Ensuring data integrity in storage, Proceedings of the 2005 ACM workshop on Storage security and survivability , StorageSS '05, 2005.
DOI : 10.1145/1103780.1103784

S. Schechter, Computer Security Strength & Risk: A Quantitative Approach, 2004.

B. Schneier, Attack Trees, Dr. Dobb's journal, vol.24, issue.12, 1999.
DOI : 10.1002/9781119183631.ch21

N. Hardy, The Confused Deputy, ACM SIGOPS Operating Systems Review, vol.22, issue.4, 1988.
DOI : 10.1145/54289.871709

R. Wojtczuk, Adventures with a certain Xen vulnerability (in the PVFB backend) Message sent to bugtraq mailing list on, 2008.

T. Ormandy, An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments, Proc. CanSecWest Applied Security Conference, 2007.

K. Kortchinsky, Cloudburst ? Hacking 3D and Breaking out of VMware, 2009.

M. Blanc, K. Guerin, J. Lalande, and V. L. Port, Mandatory Access Control implantation against potential NFS vulnerabilities, 2009 International Symposium on Collaborative Technologies and Systems, 2009.
DOI : 10.1109/CTS.2009.5067481

URL : https://hal.archives-ouvertes.fr/hal-00451794

D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman et al., The Eucalyptus Open-Source Cloud-Computing System, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, 2009.
DOI : 10.1109/CCGRID.2009.93

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.155.2753

J. Liedtke, On micro-kernel construction, Proc. SOSP, 1995.
DOI : 10.1145/224057.224075

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.233.861

G. Heiser, V. Uhlig, and J. Levasseur, Are virtual-machine monitors microkernels done right?, ACM SIGOPS Operating Systems Review, vol.40, issue.1, 2006.
DOI : 10.1145/1113361.1113363

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.8269

M. Hohmuth, M. Peter, H. Härtig, and J. S. Shapiro, Reducing TCB size by using untrusted components, Proceedings of the 11th workshop on ACM SIGOPS European workshop: beyond the PC , EW11, 2004.
DOI : 10.1145/1133572.1133615

V. Jujjuri, E. V. Hensbergen, and A. Liguori, VirtFS ? A virtualization aware File System pass-through, Proc. Ottawa Linux Symposium, 2010.

M. Christodorescu, R. Sailer, D. L. Schales, D. Sgandurra, and D. Zamboni, Cloud security is not (just) virtualization security, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, 2009.
DOI : 10.1145/1655008.1655022

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.625.8837

N. L. Petroni-jr and M. Hicks, Automated detection of persistent kernel control-flow attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007.
DOI : 10.1145/1315245.1315260