메뉴 건너뛰기




Volumn , Issue , 2008, Pages 257-261

Xen on ARM: System virtualization using xen hypervisor for ARM-based secure mobile phones

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER OPERATING SYSTEMS; METALS; MOBILE DEVICES; MOBILE PHONES; TECHNOLOGY; TELECOMMUNICATION; TELECOMMUNICATION EQUIPMENT; TELEPHONE; TELEPHONE SETS;

EID: 51949098506     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ccnc08.2007.64     Document Type: Conference Paper
Times cited : (165)

References (15)
  • 1
    • 51949087106 scopus 로고    scopus 로고
    • Secure architecture and implementation of xen on arm for mobile devices
    • Yorktown Heights, NY, Online, Available
    • S. B. Suh, "Secure architecture and implementation of xen on arm for mobile devices," in 4th Xen Summit, Yorktown Heights, NY, 2007. [Online]. Available: http://www.xensource.com/files/xensummit_4/ Secure_Xen_ARM_xen-summit-04%_07_Suh.pdf
    • (2007) 4th Xen Summit
    • Suh, S.B.1
  • 2
    • 0003003638 scopus 로고
    • A study of replacement algorithms for virtual storage computers
    • L. Belady, "A study of replacement algorithms for virtual storage computers," IBM Systems Journal, vol. 5, no. 2, pp. 78-101, 1966.
    • (1966) IBM Systems Journal , vol.5 , Issue.2 , pp. 78-101
    • Belady, L.1
  • 3
    • 20344383743 scopus 로고    scopus 로고
    • Virtual machine monitors: Current technology and future trends
    • May
    • M. Rosenblom and T. Garfinkel, "Virtual machine monitors: current technology and future trends," IEEE Computer, vol. 38, no. 5, pp. 39-47, May 2005.
    • (2005) IEEE Computer , vol.38 , Issue.5 , pp. 39-47
    • Rosenblom, M.1    Garfinkel, T.2
  • 4
    • 0016082273 scopus 로고
    • Formal requirements for virtualizable third generation architectures
    • G. J. Popek and R. P. Goldberg, "Formal requirements for virtualizable third generation architectures," Communications of the ACM, vol. 17, no. 7, pp. 412-421, 1974.
    • (1974) Communications of the ACM , vol.17 , Issue.7 , pp. 412-421
    • Popek, G.J.1    Goldberg, R.P.2
  • 7
    • 85084161596 scopus 로고    scopus 로고
    • Analysis of the intel pentium's ability to support a secure virtual machine monitor
    • Denver, Colorado, USA, August
    • J. S. Robin and C. E. Irvine, "Analysis of the intel pentium's ability to support a secure virtual machine monitor," in Proc. 9th USENIX Security Symposium, Denver, Colorado, USA, August 2000.
    • (2000) Proc. 9th USENIX Security Symposium
    • Robin, J.S.1    Irvine, C.E.2
  • 8
    • 46449132546 scopus 로고    scopus 로고
    • Fast secure virtualization for the arm platform,
    • Master's thesis, Department of Computer Science, University of British Columbia, March
    • D. R. Ferstay, "Fast secure virtualization for the arm platform," Master's thesis, Department of Computer Science, University of British Columbia, March 2006.
    • (2006)
    • Ferstay, D.R.1
  • 12
    • 35248873429 scopus 로고    scopus 로고
    • Implementation of fast address-space switching and tlb sharing on the strong arm processor
    • A. Wiggins, H. Tuch, V. Uhlig, and G. Heiser, "Implementation of fast address-space switching and tlb sharing on the strong arm processor," Advances in Computer Systems Architecture, pp. 352-364, 2003.
    • (2003) Advances in Computer Systems Architecture , pp. 352-364
    • Wiggins, A.1    Tuch, H.2    Uhlig, V.3    Heiser, G.4
  • 14
    • 51949088395 scopus 로고    scopus 로고
    • C. Andres N.Sloss, Dominic Symes, ARM System Developer's Guide. Morgan Kaufmann, 2004.
    • C. Andres N.Sloss, Dominic Symes, ARM System Developer's Guide. Morgan Kaufmann, 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.