Virtualization of Storage and Systems

[1]  Muli Ben-Yehuda,et al.  The Turtles Project: Design and Implementation of Nested Virtualization , 2010, OSDI.

[2]  Christoph Wegener,et al.  Technical Issues of Forensic Investigations in Cloud Computing Environments , 2011, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.

[3]  Aameek Singh,et al.  Shares and utilities based power consolidation in virtualized server environments , 2009, 2009 IFIP/IEEE International Symposium on Integrated Network Management.

[4]  Kang-Won Lee,et al.  Application-aware virtual machine migration in data centers , 2011, 2011 Proceedings IEEE INFOCOM.

[5]  Ariel J. Feldman,et al.  SPORC: Group Collaboration using Untrusted Cloud Resources , 2010, OSDI.

[6]  Xiangliang Zhang,et al.  Virtual machine migration in an over-committed cloud , 2012, 2012 IEEE Network Operations and Management Symposium.

[7]  Nick Feamster,et al.  Trellis: a platform for building flexible, fast virtual networks on commodity hardware , 2008, CoNEXT '08.

[8]  HarrisTim,et al.  Xen and the art of virtualization , 2003 .

[9]  Server-storage virtualization: integration and load balancing in data centers , 2008, HiPC 2008.

[10]  Alan L. Cox,et al.  Optimizing network virtualization in Xen , 2006 .

[11]  Vasileios Pappas,et al.  Improving the Scalability of Data Center Networks with Traffic-aware Virtual Machine Placement , 2010, 2010 Proceedings IEEE INFOCOM.

[12]  Lixin Gao,et al.  How to lease the internet in your spare time , 2007, CCRV.

[13]  Ole Agesen,et al.  A comparison of software and hardware techniques for x86 virtualization , 2006, ASPLOS XII.

[14]  Sandeep Uttamchandani,et al.  ChargeView: An integrated tool for implementing chargeback in IT systems , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.

[15]  Kok-Kiong Yap,et al.  Towards software-friendly networks , 2010, APSys '10.

[16]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[17]  Xiaohui Liang,et al.  Secure provenance: the essential of bread and butter of data forensics in cloud computing , 2010, ASIACCS '10.