메뉴 건너뛰기




Volumn 38, Issue 5, 2005, Pages 57-62

Rethinking the design of virtual machine monitors

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER OPERATING SYSTEMS; INPUT OUTPUT PROGRAMS; INTERFACES (COMPUTER); LEGACY SYSTEMS; SYSTEMS ENGINEERING; TIME SHARING PROGRAMS;

EID: 20344391681     PISSN: 00189162     EISSN: None     Source Type: Trade Journal    
DOI: 10.1109/MC.2005.169     Document Type: Article
Times cited : (25)

References (10)
  • 1
    • 0019613332 scopus 로고
    • "The Origin of the VM/370 Time-Sharing System"
    • R.J. Creasy, "The Origin of the VM/370 Time-Sharing System," IBM J. Research and Development, vol. 25, no. 5, 1981, pp. 483-490.
    • (1981) IBM J. Research and Development , vol.25 , Issue.5 , pp. 483-490
    • Creasy, R.J.1
  • 2
    • 0026254933 scopus 로고
    • "A Retrospective on the VAX VMM Security Kernel"
    • Nov
    • P.A. Karger et al., "A Retrospective on the VAX VMM Security Kernel," IEEE Trans. Software Engineering, Nov. 1991, pp. 1147-1165.
    • (1991) IEEE Trans. Software Engineering , pp. 1147-1165
    • Karger, P.A.1
  • 3
    • 21644433634 scopus 로고    scopus 로고
    • "Xen and the Art of Virtualization"
    • (SOSP 2003), ACM Press
    • P. Barham et al., "Xen and the Art of Virtualization," Proc. 19th Symp. Operating System Principles (SOSP 2003), ACM Press, 2003, pp. 164-177.
    • (2003) Proc. 19th Symp. Operating System Principles , pp. 164-177
    • Barham, P.1
  • 5
    • 85084161596 scopus 로고    scopus 로고
    • "Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor"
    • Usenix
    • J.S. Robin and C.E. Irvine, "Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor," Proc. 9th Usenix Security Symp., Usenix, 2000, pp. 129-144.
    • (2000) Proc. 9th Usenix Security Symp. , pp. 129-144
    • Robin, J.S.1    Irvine, C.E.2
  • 6
    • 0016082273 scopus 로고
    • "Formal Requirements for Virtualizable Third-Generation Architectures"
    • July
    • G.J. Popek and R.P. Goldberg, "Formal Requirements for Virtualizable Third-Generation Architectures," Comm. ACM, July 1974, pp. 412-421.
    • (1974) Comm. ACM , pp. 412-421
    • Popek, G.J.1    Goldberg, R.P.2
  • 7
    • 20344379862 scopus 로고    scopus 로고
    • "Building Robust Systems with Virtual Machine Monitors"
    • Univ. Washington Generals Examination, www.cs.washington.edu/homes/ andrew/papers/general.pdf
    • A.J. Whitaker, "Building Robust Systems with Virtual Machine Monitors," Univ. Washington Generals Examination, 2004; www.cs.washington.edu/homes/andrew/papers/general.pdf.
    • (2004)
    • Whitaker, A.J.1
  • 8
    • 84978401615 scopus 로고    scopus 로고
    • "Enabling Intrusion Analysis through Virtual Machine Logging and Replay"
    • (OSD102), Usenix
    • G.W. Dunlap et al., "Enabling Intrusion Analysis through Virtual Machine Logging and Replay," Proc. 2002 Symp. Operating Systems Design and Implementation (OSDI 02), Usenix, 2002, pp. 211-224.
    • (2002) Proc. 2002 Symp. Operating Systems Design and Implementation , pp. 211-224
    • Dunlap, G.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.