Evaluating Scalability and Performance of a Security Management Solution in Large Virtualized Environments
暂无分享,去创建一个
Evgenia Smirni | Jason Mills | Ludmila Cherkasova | Lishan Yang | Rajeev Badgujar | Jack Blancaflor | Rahul Konde
[1] Prashant J. Shenoy,et al. Profiling and Modeling Resource Usage of Virtualized Applications , 2008, Middleware.
[2] Hsien-Hsin S. Lee,et al. Ally: OS-Transparent Packet Inspection Using Sequestered Cores , 2011, 2011 ACM/IEEE Seventh Symposium on Architectures for Networking and Communications Systems.
[3] Robbert van Renesse,et al. Supercloud: Opportunities and Challenges , 2015, OPSR.
[4] Amin Vahdat,et al. Enforcing Performance Isolation Across Virtual Machines in Xen , 2006, Middleware.
[5] Ludmila Cherkasova,et al. Measuring CPU Overhead for I/O Processing in the Xen Virtual Machine Monitor , 2005, USENIX ATC, General Track.
[6] Marin Litoiu,et al. An architecture for overlaying private clouds on public providers , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).
[7] Marianne Shaw,et al. Scale and performance in the Denali isolation kernel , 2002, OSDI '02.
[8] Haibo Chen,et al. CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization , 2011, SOSP.
[9] Adrian Perrig,et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes , 2007, SOSP.
[10] Samuel T. King,et al. Operating System Support for Virtual Machines , 2003, USENIX Annual Technical Conference, General Track.
[11] Gil Neiger,et al. Intel virtualization technology , 2005, Computer.
[12] Willy Zwaenepoel,et al. Diagnosing performance overheads in the xen virtual machine environment , 2005, VEE '05.
[13] Muli Ben-Yehuda,et al. The Turtles Project: Design and Implementation of Nested Virtualization , 2010, OSDI.
[14] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[15] Xuxian Jiang,et al. Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing , 2008, RAID.
[16] Carl A. Waldspurger,et al. Memory resource management in VMware ESX server , 2002, OSDI '02.
[17] Beng-Hong Lim,et al. Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor , 2001, USENIX Annual Technical Conference, General Track.