{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:39:24Z","timestamp":1729618764737,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/cscloud.2016.40","type":"proceedings-article","created":{"date-parts":[[2016,8,18]],"date-time":"2016-08-18T16:28:16Z","timestamp":1471537696000},"page":"50-53","source":"Crossref","is-referenced-by-count":3,"title":["CloudAuditor: A Cloud Auditing Framework Based on Nested Virtualization"],"prefix":"10.1109","author":[{"given":"Zhe","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jin","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/1653662.1653720"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/1346256.1346269"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/1655148.1655150"},{"key":"ref13","article-title":"Antfarm: Tracking Processes in a Virtual Machine Environment","author":"jones","year":"2006","journal-title":"Proceedings of the USENIX Annual Technical Conference (USENIX'06)"},{"year":"0","journal-title":"VMware VMsafe","key":"ref14"},{"key":"ref4","first-page":"47","article-title":"Xen and the art of repeated research[A]","author":"clark","year":"2004","journal-title":"Proceedings of the Annual Conference on USENIX Annual Technical Conference"},{"year":"2013","author":"forbes","journal-title":"VMware VSphere Design","key":"ref3"},{"key":"ref6","first-page":"549","article-title":"Libvmi: a library for bridging the semantic gap between guest OS and VMM","author":"haiquan","year":"2012","journal-title":"Computer and Information Technology (CIT) 2012 IEEE 12th International Conference on"},{"key":"ref5","first-page":"225","article-title":"kvm: the Linux virtual machine monitor","volume":"1","author":"avi","year":"2007","journal-title":"Proceedings of the Linux Symposium"},{"key":"ref8","article-title":"A Virtual Machine Introspection Based Architecture for Intrusion Detection","author":"garnkel","year":"2003","journal-title":"Network and Distributed System Security Symposium 2003"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/1455770.1455779"},{"key":"ref2","article-title":"The turtles project: Design and implementation of nested virtualization","author":"har'el","year":"2010","journal-title":"Proc OSDI"},{"year":"2008","author":"heiser","journal-title":"Assessing The Security Risks of Cloud Computing","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/SECURWARE.2010.35"}],"event":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","start":{"date-parts":[[2016,6,25]]},"location":"Beijing, China","end":{"date-parts":[[2016,6,27]]}},"container-title":["2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7529275\/7545876\/07545896.pdf?arnumber=7545896","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T20:49:50Z","timestamp":1475182190000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7545896\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/cscloud.2016.40","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}