An Active Trusted Model for Virtual Machine Systems
暂无分享,去创建一个
[1] Huanguo Zhang,et al. A Trusted Computing Model Based on Code Authorization , 2008, 2008 International Symposiums on Information Processing.
[2] Jeffrey P. Buzen,et al. The evolution of virtual machine architecture , 1973, AFIPS National Computer Conference.
[3] Matthew Arnold,et al. A Survey of Adaptive Optimization in Virtual Machines , 2005, Proceedings of the IEEE.
[4] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[5] C. R. Attanasio. Virtual machines and data security , 1973 .
[6] Brian D. Noble,et al. When virtual is better than real [operating system relocation to virtual machines] , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[7] Brian Berger,et al. Trusted computing group history , 2005, Inf. Secur. Tech. Rep..
[8] Gil Neiger,et al. Intel virtualization technology , 2005, Computer.
[9] Robert P. Goldberg,et al. Architectural Principles for Virtual Computer Systems , 1973 .
[10] Vittore Casarosa,et al. VHM : a Virtual Hardware Monitor , 1973 .
[11] Robert P. Goldberg,et al. Architecture of virtual machines , 1973, Workshop on Virtual Computer Systems.
[12] James E. Smith,et al. The architecture of virtual machines , 2005, Computer.
[13] Tal Garfinkel,et al. Virtual machine monitors: current technology and future trends , 2005, Computer.
[14] Chris Mitchell. Trusted Computing (Professional Applications of Computing) (Professional Applications of Computing) , 2005 .
[15] Scott A. Rotondo. Trusted Computing Group , 2011, Encyclopedia of Cryptography and Security.
[16] Stefan Berger,et al. vTPM: Virtualizing the Trusted Platform Module , 2006, USENIX Security Symposium.
[17] Eli M. Dow,et al. Xen and the Art of Repeated Research , 2004, USENIX Annual Technical Conference, FREENIX Track.
[18] Robert Rose. Survey of System Virtualization Techniques , 2004 .