GPFS: A Shared-disk File System For Large Computing Clusters, Proc. File and Storage Technologies, 2002. ,
kvm: the Linux Virtual Machine Monitor, Proc. Linux Symposium, 2007. ,
SaaS Multi-Tenancy: Framework, Technology, and Case Study, International Journal of Cloud Applications and Computing (IJCAC), vol.1, issue.1, 2011. ,
DOI : 10.4018/ijcac.2011010105
NFS File Handle Security, tech. rep, 2004. ,
IBM Scale out File Services: Reinventing network-attached storage, IBM Journal of Research and Development, vol.52, issue.4.5, 2008. ,
DOI : 10.1147/rd.524.0319
The Design and Implementation of Zap: A System for Migrating Computing Environments, ACM SIGOPS Operating Systems Review, vol.36, 2002. ,
Jails: Confining the omnipotent root, Proc. International System Administration and Network Engineering, 2000. ,
Solaris Zones: Operating System Support for Consolidating Commercial Workloads, Proc. System administration, 2004. ,
SELinux: NSA's Open Source Security Enhanced Linux, 2004. ,
A survey of confidential data storage and deletion methods, ACM Computing Surveys, vol.43, issue.1, 2010. ,
DOI : 10.1145/1824795.1824797
Ensuring data integrity in storage, Proceedings of the 2005 ACM workshop on Storage security and survivability , StorageSS '05, 2005. ,
DOI : 10.1145/1103780.1103784
Computer Security Strength & Risk: A Quantitative Approach, 2004. ,
Attack Trees, Dr. Dobb's journal, vol.24, issue.12, 1999. ,
DOI : 10.1002/9781119183631.ch21
The Confused Deputy, ACM SIGOPS Operating Systems Review, vol.22, issue.4, 1988. ,
DOI : 10.1145/54289.871709
Adventures with a certain Xen vulnerability (in the PVFB backend) Message sent to bugtraq mailing list on, 2008. ,
An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments, Proc. CanSecWest Applied Security Conference, 2007. ,
Cloudburst ? Hacking 3D and Breaking out of VMware, 2009. ,
Mandatory Access Control implantation against potential NFS vulnerabilities, 2009 International Symposium on Collaborative Technologies and Systems, 2009. ,
DOI : 10.1109/CTS.2009.5067481
URL : https://hal.archives-ouvertes.fr/hal-00451794
The Eucalyptus Open-Source Cloud-Computing System, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, 2009. ,
DOI : 10.1109/CCGRID.2009.93
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.155.2753
On micro-kernel construction, Proc. SOSP, 1995. ,
DOI : 10.1145/224057.224075
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.233.861
Are virtual-machine monitors microkernels done right?, ACM SIGOPS Operating Systems Review, vol.40, issue.1, 2006. ,
DOI : 10.1145/1113361.1113363
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.8269
Reducing TCB size by using untrusted components, Proceedings of the 11th workshop on ACM SIGOPS European workshop: beyond the PC , EW11, 2004. ,
DOI : 10.1145/1133572.1133615
VirtFS ? A virtualization aware File System pass-through, Proc. Ottawa Linux Symposium, 2010. ,
Cloud security is not (just) virtualization security, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, 2009. ,
DOI : 10.1145/1655008.1655022
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.625.8837
Automated detection of persistent kernel control-flow attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007. ,
DOI : 10.1145/1315245.1315260