Secure Live Virtual Machines Migration: Issues and Solutions
暂无分享,去创建一个
[1] Paul Francis,et al. A study of prefix hijacking and interception in the internet , 2007, SIGCOMM '07.
[2] Anton Stiglic,et al. Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems , 2001, Information Hiding.
[3] Wei Wang,et al. Secured and reliable VM migration in personal cloud , 2010, 2010 2nd International Conference on Computer Engineering and Technology.
[4] Calton Pu,et al. Buffer overflows: attacks and defenses for the vulnerability of the decade , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[5] Andrew Warfield,et al. Live migration of virtual machines , 2005, NSDI.
[6] Leon Gommans,et al. Seamless live migration of virtual machines over the MAN/WAN , 2006, Future Gener. Comput. Syst..
[7] Men Long,et al. A hypervisor-based system for protecting software runtime memory and persistent storage , 2008, SpringSim '08.
[8] Calton Pu,et al. Buffer overflows: attacks and defenses for the vulnerability of the decade , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[9] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[10] Aboubaker Lasebae,et al. Providing Security in 4G Systems: Unveiling the Challenges , 2010, 2010 Sixth Advanced International Conference on Telecommunications.
[11] Jyoti Shetty,et al. A Survey on Techniques of Secure Live Migration of Virtual Machine , 2012 .
[12] Diego Perez-Botero. A Brief Tutorial on Live Virtual Machine Migration From a Security Perspective , 2011 .
[13] Stefan Katzenbeisser,et al. Improving security of virtual machines during live migrations , 2013, 2013 Eleventh Annual Conference on Privacy, Security and Trust.
[14] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[15] Jyoti Shetty,et al. A framework for secure live migration of virtual machines , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[16] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[17] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[18] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.