Security Challenges on the Clone, Snapshot, Migration and Rollback of Xen Based Computing Environments
暂无分享,去创建一个
Minglu Li | Lei Yu | Yuan Luo | Chuliang Weng
[1] Tal Garfinkel,et al. Virtualization Aware File Systems: Getting Beyond the Limitations of Virtual Disks , 2006, NSDI.
[2] Tal Garfinkel,et al. When Virtual Is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments , 2005, HotOS.
[3] Cormac Herley,et al. How to Login from an Internet Cafe Without Worrying about Keyloggers , 2006 .
[4] Lei Zhang,et al. Generalized file system dependencies , 2007, SOSP.
[5] Dutch T. Meyer,et al. Parallax: virtual disks for virtual machines , 2008, Eurosys '08.
[6] Craig Metz,et al. A One-Time Password System , 1996, RFC.
[7] Arif Merchant,et al. FAB: Enterprise Storage Systems on a Shoestring , 2003, HotOS.
[8] Neil Haller,et al. The S/KEY One-Time Password System , 1995, RFC.
[9] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.