-
1
-
-
51949087106
-
Secure architecture and implementation of xen on arm for mobile devices
-
Yorktown Heights, NY, Online, Available
-
S. B. Suh, "Secure architecture and implementation of xen on arm for mobile devices," in 4th Xen Summit, Yorktown Heights, NY, 2007. [Online]. Available: http://www.xensource.com/files/xensummit_4/ Secure_Xen_ARM_xen-summit-04%_07_Suh.pdf
-
(2007)
4th Xen Summit
-
-
Suh, S.B.1
-
2
-
-
0003003638
-
A study of replacement algorithms for virtual storage computers
-
L. Belady, "A study of replacement algorithms for virtual storage computers," IBM Systems Journal, vol. 5, no. 2, pp. 78-101, 1966.
-
(1966)
IBM Systems Journal
, vol.5
, Issue.2
, pp. 78-101
-
-
Belady, L.1
-
3
-
-
20344383743
-
Virtual machine monitors: Current technology and future trends
-
May
-
M. Rosenblom and T. Garfinkel, "Virtual machine monitors: current technology and future trends," IEEE Computer, vol. 38, no. 5, pp. 39-47, May 2005.
-
(2005)
IEEE Computer
, vol.38
, Issue.5
, pp. 39-47
-
-
Rosenblom, M.1
Garfinkel, T.2
-
4
-
-
0016082273
-
Formal requirements for virtualizable third generation architectures
-
G. J. Popek and R. P. Goldberg, "Formal requirements for virtualizable third generation architectures," Communications of the ACM, vol. 17, no. 7, pp. 412-421, 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
, pp. 412-421
-
-
Popek, G.J.1
Goldberg, R.P.2
-
6
-
-
21644433634
-
Xen and the art of virtualization
-
October
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, "Xen and the art of virtualization," in Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), October 2003.
-
(2003)
Proceedings of the ACM Symposium on Operating Systems Principles (SOSP)
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
7
-
-
85084161596
-
Analysis of the intel pentium's ability to support a secure virtual machine monitor
-
Denver, Colorado, USA, August
-
J. S. Robin and C. E. Irvine, "Analysis of the intel pentium's ability to support a secure virtual machine monitor," in Proc. 9th USENIX Security Symposium, Denver, Colorado, USA, August 2000.
-
(2000)
Proc. 9th USENIX Security Symposium
-
-
Robin, J.S.1
Irvine, C.E.2
-
8
-
-
46449132546
-
Fast secure virtualization for the arm platform,
-
Master's thesis, Department of Computer Science, University of British Columbia, March
-
D. R. Ferstay, "Fast secure virtualization for the arm platform," Master's thesis, Department of Computer Science, University of British Columbia, March 2006.
-
(2006)
-
-
Ferstay, D.R.1
-
12
-
-
35248873429
-
Implementation of fast address-space switching and tlb sharing on the strong arm processor
-
A. Wiggins, H. Tuch, V. Uhlig, and G. Heiser, "Implementation of fast address-space switching and tlb sharing on the strong arm processor," Advances in Computer Systems Architecture, pp. 352-364, 2003.
-
(2003)
Advances in Computer Systems Architecture
, pp. 352-364
-
-
Wiggins, A.1
Tuch, H.2
Uhlig, V.3
Heiser, G.4
-
14
-
-
51949088395
-
-
C. Andres N.Sloss, Dominic Symes, ARM System Developer's Guide. Morgan Kaufmann, 2004.
-
C. Andres N.Sloss, Dominic Symes, ARM System Developer's Guide. Morgan Kaufmann, 2004.
-
-
-
-
15
-
-
51949117926
-
A multi-layer mandatory access control mechanism for mobile devices based on virtualization
-
Las Vegas, Nevada, USA, January
-
S.-M. Lee, S.-B. Suh, B. Jeong, and S.-D. Mo, "A multi-layer mandatory access control mechanism for mobile devices based on virtualization," in Proc. 4th IEEE Concumer Communication and Networking Conference, Las Vegas, Nevada, USA, January 2008.
-
(2008)
Proc. 4th IEEE Concumer Communication and Networking Conference
-
-
Lee, S.-M.1
Suh, S.-B.2
Jeong, B.3
Mo, S.-D.4
|