@dblp

Shielding Applications from an Untrusted Cloud with Haven.

, , and . ACM Trans. Comput. Syst., 33 (3): 8:1-8:26 (2015)

Links and resources

Tags