XEN Virtual Machine Technology and Its Security Analysis
暂无分享,去创建一个
[1] Paul A. Karger,et al. Multi-level security requirements for hypervisors , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[2] Lionel Litty,et al. Hypervisor-based Intrusion Detection , 2005 .
[3] Stefan Berger,et al. Building a MAC-based security architecture for the Xen open-source hypervisor , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[4] Qing Si. Covert Channel Analysis in Secure Operating Systems with High Security Levels , 2004 .
[5] Nadir Kiyanclar. A Survey of Virtualization Techniques Focusing on Secure On-Demand Cluster Computing , 2005, ArXiv.
[6] Tal Garfinkel,et al. When Virtual Is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments , 2005, HotOS.
[7] Qing Si-han,et al. Covert Channel Analysis in Secure Operating Systems with High Security Levels , 2004 .
[8] David R. Cheriton,et al. Borrowed-virtual-time (BVT) scheduling: supporting latency-sensitive threads in a general-purpose scheduler , 1999, OPSR.