Virtualizing the VAX architecture
暂无分享,去创建一个
[1] Stuart E. Madnick,et al. Application and analysis of the virtual machine approach to information system security and isolation , 1973, Workshop on Virtual Computer Systems.
[2] Robert P. Goldberg,et al. Architectural Principles for Virtual Computer Systems , 1973 .
[3] Gerald J. Popek,et al. Formal requirements for virtualizable third generation architectures , 1974, CACM.
[4] M. Malik,et al. Operating Systems , 1992, Lecture Notes in Computer Science.
[5] Gerald J. Popek,et al. The PDP-11 virtual machine architecture: A case study , 1975, SOSP.
[6] Richard A. MacKinnon. The Changing Virtual Machine Environment: Interfaces to Real Hardware, Virtual Hardware, and Other Virtual Machines , 1979, IBM Syst. J..
[7] Arthur G. Olbert. Crossing the machine interface , 1982, MICRO 15.
[8] Peter H. Gum,et al. System/370 Extended Architecture: Facilities for Virtual Machines , 1983, IBM J. Res. Dev..
[9] William H. Tetzlaff,et al. Paging Enhancements in VM/SP HPO , 1984, Int. CMG Conference.
[10] Umeno Hidenori,et al. Reduction of 2-0-Translation Table Maintenance Overhead in a Virtual Machine System , 1985 .
[11] Timothy E. Leonard. VAX architecture reference manual , 1987 .
[12] Jerry Greenberg,et al. A Page-Swapping Prototype for VM/HPO , 1987, IBM Syst. J..
[13] Mary Ellen Zurko,et al. A VMM security kernel for the VAX architecture , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[14] K. F. Seiden,et al. The auditing facility for a VMM security kernel , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[15] Paul A. Karger,et al. Storage channels in disk arm optimization , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[16] John M. Boone,et al. INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .
[17] Wei-Ming Hu,et al. Reducing timing channels with fuzzy time , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.