메뉴 건너뛰기




Volumn 5, Issue 4, 2007, Pages 68-71

Ghost in the virtual machine
[No Author Info available]

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SOFTWARE PORTABILITY; HIGH LEVEL LANGUAGES; INTEROPERABILITY; SECURITY OF DATA;

EID: 34547972605     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2007.83     Document Type: Article
Times cited : (2)

References (10)
  • 2
    • 33645356018 scopus 로고
    • IBM Corporation, Cambridge Scientific Center Report 320-2007
    • May
    • R.J. Adair et al., "A Virtual Machine System for the 360/40," IBM Corporation, Cambridge Scientific Center Report 320-2007, May 1966.
    • (1966)
    • Adair, R.J.1
  • 3
    • 0018289092 scopus 로고
    • Evolution of a Virtual Machine Subsystem
    • E.C. Hendricks and T.C. Hartmann, "Evolution of a Virtual Machine Subsystem," IBM Systems J., vol. 18, no. 1, 1979, pp. 111-142.
    • (1979) IBM Systems J , vol.18 , Issue.1 , pp. 111-142
    • Hendricks, E.C.1    Hartmann, T.C.2
  • 4
    • 0019613332 scopus 로고
    • The Origin of the VM/370 Time-Sharing System
    • R.J. Creasy, "The Origin of the VM/370 Time-Sharing System," IBM J. Research and Development, vol. 25 no. 5, 1981, pp. 483-490.
    • (1981) IBM J. Research and Development , vol.25 , Issue.5 , pp. 483-490
    • Creasy, R.J.1
  • 5
    • 0016082273 scopus 로고
    • Formal Requirements for Virtualizable Third-Generation Architectures
    • G.J. Popek and R.P. Goldberg, "Formal Requirements for Virtualizable Third-Generation Architectures," Comm. ACM, vol. 17, no. 7, 1974, pp. 412-421.
    • (1974) Comm. ACM , vol.17 , Issue.7 , pp. 412-421
    • Popek, G.J.1    Goldberg, R.P.2
  • 6
    • 84879848814 scopus 로고
    • Application and Analysis of the Virtual Machine Approach to Information System Security and Isolation
    • ACM Press
    • S.E. Madnick and J.J. Donovan, "Application and Analysis of the Virtual Machine Approach to Information System Security and Isolation," Proc. Workshop on Virtual Computer Systems, ACM Press, 1973, pp. 210-224.
    • (1973) Proc. Workshop on Virtual Computer Systems , pp. 210-224
    • Madnick, S.E.1    Donovan, J.J.2
  • 7
    • 0015672289 scopus 로고
    • A Note on the Confinement Problem
    • B.W. Lampson, "A Note on the Confinement Problem," Comm. ACM, vol. 16 no. 10, 1973, pp. 613-615.
    • (1973) Comm. ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 9
    • 0016873760 scopus 로고
    • Penetrating an Operating System: A Study of VM/370 Integrity
    • C.R. Attanasio, P.W. Markstein, and R.J. Phillips, "Penetrating an Operating System: A Study of VM/370 Integrity," IBM Systems J., vol. 15 no. 1, 1976, pp. 102-116.
    • (1976) IBM Systems J , vol.15 , Issue.1 , pp. 102-116
    • Attanasio, C.R.1    Markstein, P.W.2    Phillips, R.J.3
  • 10
    • 33751032041 scopus 로고    scopus 로고
    • SubVirt: Implementing Malware with Virtual Machines
    • IEEE CS Press, pp
    • S.T. King et al. "SubVirt: Implementing Malware with Virtual Machines," Proc. 2006 IEEE Symp Security and Privacy, 2006, IEEE CS Press, pp. 314-327.
    • (2006) Proc. 2006 IEEE Symp Security and Privacy , pp. 314-327
    • King, S.T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.