| [1] GONZALES D, KAPLAN J M, SALTZMAN E, et al. Cloud-trust-a security assessment model for Infrastructure as a Service (IaaS) clouds[J]. IEEE Transactions on Cloud Computing, 2017, 5(3):523-536. [2] LIU L, WANG A, ZANG W, et al. Shuffler:mitigate cross-VM side-channel attacks via hypervisor scheduling[C]//Proceedings of the 2018 International Conference on Security and Privacy in Communication Systems, LNICST 254. Berlin:Springer, 2018:491-511.
 [3] SCHWARTZ M J. New virtualization vulnerability allows escape to hypervisor attacks[J]. Information Week Security, 2012, 4(2013):12.
 [4] SINGH N, SINGH A K. SQL-injection vulnerabilities resolving using valid security tool in cloud[J]. Pertanika Journal of Science & Technology, 2019, 27(1):159-174.
 [5] LI P, LI J, HUANG Z, et al. Privacy-preserving outsourced classification in cloud computing[J]. Cluster Computing, 2018, 21(1):277-286.
 [6] HWANG K, BAI X, SHI Y, et al. Cloud performance modeling with benchmark evaluation of elastic scaling strategies[J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(1):130-143.
 [7] CAO J, HWANG K, LI K, et al. Optimal multiserver configuration for profit maximization in cloud computing[J]. IEEE Transactions On Parallel and Distributed Systems, 2013, 24(6):1087-1096.
 [8] HWANG K, SHI Y, BAI X. Scale-out vs. scale-up techniques for cloud performance and productivity[C]//Proceedings of the 2014 IEEE 6th International Conference on Cloud Computing Technology and Science. Piscataway:IEEE, 2014:763-768.
 [9] ZAMAN S, ADAMS B, HASSAN A E. Security versus performance bugs:a case study on FireFox[C]//Proceedings of the 8th Working Conference on Mining Software Repositories. New York:ACM, 2011:93-102.
 [10] BATISTA B G, FERREIRA C H G, SEGURA D C M, et al. A QoS-driven approach for cloud computing addressing attributes of performance and security[J]. Future Generation Computer Systems, 2017, 68:260-274.
 [11] ALIA M, LACOSTE M, HE R, et al. Putting together QoS and security in autonomic pervasive systems[C]//Proceedings of the 6th ACM Workshop on QoS and Security for Wireless and Mobile Networks. New York:ACM, 2010:19-28.
 [12] WANG Y, LIN C, LI Q. Performance analysis of email systems under three types of attacks[J]. Performance Evaluation, 2010, 67(6):485-499.
 [13] LOMBARDI F, DI PIETRO R. Secure virtualization for cloud computing[J]. Journal of Network and Computer Applications, 2011, 34(4):1113-1122.
 [14] ARSHAD J, TOWNEND P, XU J. Quantification of security for compute intensive workloads in clouds[C]//Proceedings of the 15th International Conference on Parallel and Distributed Systems. Piscstaway:IEEE, 2009:479-486.
 [15] OZKAN S. CVE details:the ultimate security vulnerabiltiy data source[EB/OL].[2018-09-10]. https://www.cvedetails.com/cve/CVE-2007-4593/
 [16] KREIDL O P. Analysis of a Markov decision process model for intrusion tolerance[C]//Proceedings of the 2010 International Conference on Dependable Systems and Networks Workshops (DSN-W). Piscstaway:IEEE, 2010:156-161.
 [17] MADAN B B, GOGEVA-POPSTOJANOVA K, VAIDYANATHAN K, et al. Modeling and quantification of security attributes of software systems[C]//Proceedings of the 2002 International Conference on Dependable Systems and Networks. Piscstaway:IEEE, 2002:505-514.
 [18] XU F, LIU F, JIN H. Heterogeneity and interference-aware virtual machine provisioning for predictable performance in the cloud[J]. IEEE Transactions on Computers, 2016, 65(8):2470-2483.
 [19] ZHU Z, DONG S, YU C. A text hybrid clustering algorithm based on HowNet semantics[J]. Key Engineering Materials, 2011,474/475/476:2071-2078.
 |