메뉴 건너뛰기




Volumn , Issue , 2007, Pages 385-397

Secure and flexible monitoring of virtual machines

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SECURITY APPLICATIONS; MEMORY STATES; MONITORING ARCHITECTURE; MONITORING CAPABILITIES; MONITORING TECHNIQUES; OPERATING SYSTEMS; PERFORMANCE TESTING; SYSTEMS MANAGEMENT; VIRTUAL DISKS; VIRTUAL MACHINE; VIRTUAL MACHINING; VIRTUAL MEMORY;

EID: 48649085344     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2007.10     Document Type: Conference Paper
Times cited : (321)

References (32)
  • 6
    • 1642398510 scopus 로고    scopus 로고
    • Prentice Hall, 1st edition, April
    • J. Dike. User Mode Linux. Prentice Hall, 1st edition, April 2006.
    • (2006) User Mode Linux
    • Dike, J.1
  • 11
    • 84926427148 scopus 로고
    • Survey of virtual machine research
    • June
    • R. Goldberg. Survey of virtual machine research. IEEE Computer Magazine, 7:34-45, June 1974.
    • (1974) IEEE Computer Magazine , vol.7 , pp. 34-45
    • Goldberg, R.1
  • 12
    • 27144437024 scopus 로고    scopus 로고
    • On the feasibility of intrusion detection inside workstation disks
    • Technical Report CMU-PDL-03-106, Carnegie Mellon University
    • J. L. Griffin, A. Pennington, J. S. Bucy, D. Choundappan, N. Muralidharan, and G. R. Ganger. On the feasibility of intrusion detection inside workstation disks. Technical Report CMU-PDL-03-106, Carnegie Mellon University, 2003.
    • (2003)
    • Griffin, J.L.1    Pennington, A.2    Bucy, J.S.3    Choundappan, D.4    Muralidharan, N.5    Ganger, G.R.6
  • 20
    • 84879848814 scopus 로고
    • Application and analysis of the virtual machine approach to information system security and isolation
    • March
    • S. E. Madnick and J. J. Donovan. Application and analysis of the virtual machine approach to information system security and isolation. In Proceedings of the Workshop on Virtual Computer Systems, pages 210-224, March 1973.
    • (1973) Proceedings of the Workshop on Virtual Computer Systems , pp. 210-224
    • Madnick, S.E.1    Donovan, J.J.2
  • 21
    • 48649090356 scopus 로고    scopus 로고
    • Nettop: A network on your desktop
    • Fall
    • R. Meushaw and D. Simard. Nettop: A network on your desktop. Tech Trend Notes (NSA), 9(4):3-11, Fall 2000.
    • (2000) Tech Trend Notes (NSA) , vol.9 , Issue.4 , pp. 3-11
    • Meushaw, R.1    Simard, D.2
  • 24
    • 48649099088 scopus 로고    scopus 로고
    • Qumranet, Inc. Kvm: Kernel-based virtualization driver
    • Qumranet, Inc. Kvm: Kernel-based virtualization driver.
  • 28
    • 19944423977 scopus 로고
    • The protection of information in computer systems
    • July
    • J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Communications of the ACM, 17(7), July 1974.
    • (1974) Communications of the ACM , vol.17 , Issue.7
    • Saltzer, J.H.1    Schroeder, M.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.