@inproceedings{shieh2009trusted, author = {shieh, alan and Kandula, Srikanth and Greenberg, Albert}, title = {Trusted End Host Monitors For Securing Cloud Datacenters}, booktitle = {22nd ACM Symposium on Operating System Principles (Work-in-progress session)}, year = {2009}, month = {October}, abstract = {Although datacenters dedicated for cloud computing services are becoming increasingly prevalent, the current datacenter network security architecture is poorly suited for this application. Policy enforcement is smeared between the network and end hosts, increasing cost and complexity while reducing flexibility and security. Enforcement is typically done at network chokepoints, which inherently see high traffic levels from aggregate traffic; packet filters and deep packet inspection engines that can operate at these data rates require expensive, custom hardware.}, publisher = {Association for Computing Machinery, Inc.}, url = {http://approjects.co.za/?big=en-us/research/publication/trusted-end-host-monitors-for-securing-cloud-datacenters/}, }