[1] GONZALES D, KAPLAN J M, SALTZMAN E, et al. Cloud-trust-a security assessment model for Infrastructure as a Service (IaaS) clouds[J]. IEEE Transactions on Cloud Computing, 2017, 5(3):523-536. [2] LIU L, WANG A, ZANG W, et al. Shuffler:mitigate cross-VM side-channel attacks via hypervisor scheduling[C]//Proceedings of the 2018 International Conference on Security and Privacy in Communication Systems, LNICST 254. Berlin:Springer, 2018:491-511. [3] SCHWARTZ M J. New virtualization vulnerability allows escape to hypervisor attacks[J]. Information Week Security, 2012, 4(2013):12. [4] SINGH N, SINGH A K. SQL-injection vulnerabilities resolving using valid security tool in cloud[J]. Pertanika Journal of Science & Technology, 2019, 27(1):159-174. [5] LI P, LI J, HUANG Z, et al. Privacy-preserving outsourced classification in cloud computing[J]. Cluster Computing, 2018, 21(1):277-286. [6] HWANG K, BAI X, SHI Y, et al. Cloud performance modeling with benchmark evaluation of elastic scaling strategies[J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(1):130-143. [7] CAO J, HWANG K, LI K, et al. Optimal multiserver configuration for profit maximization in cloud computing[J]. IEEE Transactions On Parallel and Distributed Systems, 2013, 24(6):1087-1096. [8] HWANG K, SHI Y, BAI X. Scale-out vs. scale-up techniques for cloud performance and productivity[C]//Proceedings of the 2014 IEEE 6th International Conference on Cloud Computing Technology and Science. Piscataway:IEEE, 2014:763-768. [9] ZAMAN S, ADAMS B, HASSAN A E. Security versus performance bugs:a case study on FireFox[C]//Proceedings of the 8th Working Conference on Mining Software Repositories. New York:ACM, 2011:93-102. [10] BATISTA B G, FERREIRA C H G, SEGURA D C M, et al. A QoS-driven approach for cloud computing addressing attributes of performance and security[J]. Future Generation Computer Systems, 2017, 68:260-274. [11] ALIA M, LACOSTE M, HE R, et al. Putting together QoS and security in autonomic pervasive systems[C]//Proceedings of the 6th ACM Workshop on QoS and Security for Wireless and Mobile Networks. New York:ACM, 2010:19-28. [12] WANG Y, LIN C, LI Q. Performance analysis of email systems under three types of attacks[J]. Performance Evaluation, 2010, 67(6):485-499. [13] LOMBARDI F, DI PIETRO R. Secure virtualization for cloud computing[J]. Journal of Network and Computer Applications, 2011, 34(4):1113-1122. [14] ARSHAD J, TOWNEND P, XU J. Quantification of security for compute intensive workloads in clouds[C]//Proceedings of the 15th International Conference on Parallel and Distributed Systems. Piscstaway:IEEE, 2009:479-486. [15] OZKAN S. CVE details:the ultimate security vulnerabiltiy data source[EB/OL].[2018-09-10]. https://www.cvedetails.com/cve/CVE-2007-4593/ [16] KREIDL O P. Analysis of a Markov decision process model for intrusion tolerance[C]//Proceedings of the 2010 International Conference on Dependable Systems and Networks Workshops (DSN-W). Piscstaway:IEEE, 2010:156-161. [17] MADAN B B, GOGEVA-POPSTOJANOVA K, VAIDYANATHAN K, et al. Modeling and quantification of security attributes of software systems[C]//Proceedings of the 2002 International Conference on Dependable Systems and Networks. Piscstaway:IEEE, 2002:505-514. [18] XU F, LIU F, JIN H. Heterogeneity and interference-aware virtual machine provisioning for predictable performance in the cloud[J]. IEEE Transactions on Computers, 2016, 65(8):2470-2483. [19] ZHU Z, DONG S, YU C. A text hybrid clustering algorithm based on HowNet semantics[J]. Key Engineering Materials, 2011,474/475/476:2071-2078. |