A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
After we knew it
2014
Proceedings of the 9th ACM symposium on Information, computer and communications security - ASIA CCS '14
Infrastructure as a Service (IaaS) cloud has been attracting more and more customers as it provides the highest level of flexibility by offering configurable virtual machines (VMs) and computing infrastructures. Public VM images are usually available for customers to customize and launch. However, the 1 to N mapping between VM images and running instances in IaaS makes vulnerabilities propagate rapidly across the entire public cloud. Besides, IaaS cloud naturally comes with a larger and more
doi:10.1145/2590296.2590300
dblp:conf/ccs/ZhangZO14
fatcat:jm6iwffhojgt7iffxil64hnzfi