메뉴 건너뛰기




Volumn , Issue , 2007, Pages 102-106

Virtual machines - An idea whose time has returned: Application to network, security, and database courses

Author keywords

Database; Network; Security; Virtual machines; VMware

Indexed keywords

DATABASE SOFTWARE; SECURE ENVIRONMENT; VIRTUAL MACHINES; VMWARE;

EID: 37849053406     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1121341.1121375     Document Type: Conference Paper
Times cited : (57)

References (17)
  • 1
    • 55449100555 scopus 로고
    • Virtual Machine for the 360/40. IBM Corp., Cambridge Scientific Center
    • Report No. 320-2007, May
    • Adair, R.J., Bayles, R.U., Comeau, L.W. & Creasy, R.J. A Virtual Machine for the 360/40. IBM Corp., Cambridge Scientific Center, Report No. 320-2007, (May 1966).
    • (1966)
    • Adair, R.J.1    Bayles, R.U.2    Comeau, L.W.3    Creasy, R.J.A.4
  • 2
    • 20444452145 scopus 로고    scopus 로고
    • Configuring a Multi-Course Lab for System-Level Projects
    • Adams, J.C. & Laverell, W.D. Configuring a Multi-Course Lab for System-Level Projects. SIGCSE Bulletin, 37, 1 (2005), 525-529.
    • (2005) SIGCSE Bulletin , vol.37 , Issue.1 , pp. 525-529
    • Adams, J.C.1    Laverell, W.D.2
  • 5
    • 0034980058 scopus 로고    scopus 로고
    • Using an Isolated Network Laboratory to Teach Advanced Networks & Security
    • Hill, J.M.D., Carver, C.A., Humphries, J.W. & Pooch, U.W. Using an Isolated Network Laboratory to Teach Advanced Networks & Security, SIGCSE Bulletin, 33, 1 (2001), 36-40.
    • (2001) SIGCSE Bulletin , vol.33 , Issue.1 , pp. 36-40
    • Hill, J.M.D.1    Carver, C.A.2    Humphries, J.W.3    Pooch, U.W.4
  • 7
    • 84879848814 scopus 로고
    • Application and Analysis of the Virtual Machine Approach to Information System Security and Isolation
    • Cambridge, MA
    • Madnick, S.E. & Donovan, J.J. Application and Analysis of the Virtual Machine Approach to Information System Security and Isolation. Proc. of the Workshop on Virtual Computing Systems, Cambridge, MA (1973), 210-224.
    • (1973) Proc. of the Workshop on Virtual Computing Systems , pp. 210-224
    • Madnick, S.E.1    Donovan, J.J.2
  • 8
    • 70450167491 scopus 로고    scopus 로고
    • Mattord, H.J. & Whitman, M.E. Planning, Building and Operating The Information Security and Assurance Laboratory. InfoSecCD Conference '04, (Oct. 2004), 8-14.
    • Mattord, H.J. & Whitman, M.E. Planning, Building and Operating The Information Security and Assurance Laboratory. InfoSecCD Conference '04, (Oct. 2004), 8-14.
  • 9
    • 0036375183 scopus 로고    scopus 로고
    • Building a Cyberwar Lab: Lessons Learned Teaching cybersecurity principles to undergraduates
    • Micco, M. & Rossman, H. Building a Cyberwar Lab: Lessons Learned Teaching cybersecurity principles to undergraduates. SIGCSE Bulletin, 34, 1 (2002), 23-27.
    • (2002) SIGCSE Bulletin , vol.34 , Issue.1 , pp. 23-27
    • Micco, M.1    Rossman, H.2
  • 10
    • 20444500988 scopus 로고    scopus 로고
    • Experiences Teaching Operating Systems Using Virtual Platforms and Linux
    • Nieh, J. & Vaill, C. Experiences Teaching Operating Systems Using Virtual Platforms and Linux. SIGCSE Bulletin, 37, 1 (2005), 520-524.
    • (2005) SIGCSE Bulletin , vol.37 , Issue.1 , pp. 520-524
    • Nieh, J.1    Vaill, C.2
  • 12
    • 20444402396 scopus 로고    scopus 로고
    • The Reincarnation of Virtual Machines
    • Rosenblum, M. The Reincarnation of Virtual Machines, ACM Queue, 2 (2004).
    • (2004) ACM Queue , vol.2
    • Rosenblum, M.1
  • 13
    • 84860983931 scopus 로고    scopus 로고
    • Creating Remotely Accessible "Virtual Networks" on a Single PC to Teach Computer Networking and Operating Systems
    • Oct
    • Stockman, M. Creating Remotely Accessible "Virtual Networks" on a Single PC to Teach Computer Networking and Operating Systems. CITC4'03, (Oct. 2003), 67-71.
    • (2003) CITC4'03 , pp. 67-71
    • Stockman, M.1
  • 14
    • 37849003741 scopus 로고    scopus 로고
    • Using Virtual Machines for Teaching System Administration
    • Vollrath, A., & Jenkins, S. Using Virtual Machines for Teaching System Administration. Journal of Computing Sciences in Colleges, 20, 2 (2004), 287-292.
    • (2004) Journal of Computing Sciences in Colleges , vol.20 , Issue.2 , pp. 287-292
    • Vollrath, A.1    Jenkins, S.2
  • 15
    • 37849039196 scopus 로고    scopus 로고
    • Workstation 5 User's Manual. (2005). vmware, Inc.. Retrieved August 2, 2005, from http://www.vmware.com/pdf/ws5_manual.pdf.
    • Workstation 5 User's Manual. (2005). vmware, Inc.. Retrieved August 2, 2005, from http://www.vmware.com/pdf/ws5_manual.pdf.
  • 16
    • 33646839783 scopus 로고    scopus 로고
    • Designing and Implementing a Cyberwar Laboratory Exercise for a Computer Security Course
    • Wagner, P.J. & Wudi, J.M., Designing and Implementing a Cyberwar Laboratory Exercise for a Computer Security Course. SIGCSE Bulletin, 36, 1 (2004), 402-406.
    • (2004) SIGCSE Bulletin , vol.36 , Issue.1 , pp. 402-406
    • Wagner, P.J.1    Wudi, J.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.