A Survey on Techniques of Secure Live Migration of Virtual Machine
暂无分享,去创建一个
Jyoti Shetty | G. Shobha | R AnalaM | G. Shobha | Jyoti Shetty | R. AnalaM.
[1] Gerald J. Popek,et al. Formal requirements for virtualizable third generation architectures , 1974, SOSP '73.
[2] Mendel Rosenblum,et al. The Reincarnation of Virtual Machines , 2004, ACM Queue.
[3] Jennifer Rexford,et al. Eliminating the hypervisor attack surface for a more secure cloud , 2011, CCS '11.
[4] Ghassan O. Karame,et al. Enabling secure VM-vTPM migration in private clouds , 2011, ACSAC '11.
[5] Melvin Ver. Dynamic load balancing based on live migration of virtual machines: Security threats and effects , 2011 .
[6] Andrew Warfield,et al. Live migration of virtual machines , 2005, NSDI.
[7] Men Long,et al. A hypervisor-based system for protecting software runtime memory and persistent storage , 2008, SpringSim '08.
[8] L. W. Comeau,et al. A VIRTUAL MACHINE SYSTEM FOR THE 360/40 , 1966 .