-
1
-
-
21644433634
-
Xen and the art of virtualization
-
ACM
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proc. of SOSP'03, pages 164-177. ACM, 2003.
-
(2003)
Proc. of SOSP'03
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
2
-
-
0030092390
-
Checking for Race Conditions in File Accesses
-
M. Bishop and M. Dilger. Checking for Race Conditions in File Accesses. Computing Systems, 2(2):131-152, 1996.
-
(1996)
Computing Systems
, vol.2
, Issue.2
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
3
-
-
58049176395
-
Cloud Computing
-
IBM Corporation
-
G. Boss, P. Malladi, D. Quan, L. Legregni, and H. Hall. Cloud Computing. White paper, IBM Corporation, 2007.
-
(2007)
White paper
-
-
Boss, G.1
Malladi, P.2
Quan, D.3
Legregni, L.4
Hall, H.5
-
4
-
-
35348963573
-
Daonity-grid security from two levels of virtualization
-
12(3):123-138, 2007
-
H. Chen, J. Chen, W. Mao, and F. Yan. Daonity-grid security from two levels of virtualization. Information Security Technical Report, 12(3):123-138, 2007.
-
Information Security Technical Report
-
-
Chen, H.1
Chen, J.2
Mao, W.3
Yan, F.4
-
5
-
-
58049139900
-
Tamper-Resistant Execution in an Untrusted Operating System Using A Virtual Machine Monitor
-
Technical Report 2007-08001, Parallel Processing Institute, Fudan University, Aug
-
H. Chen, F. Zhang, C. Chen, R. Chen, B. Zang, P. Yew, and W. Mao. Tamper-Resistant Execution in an Untrusted Operating System Using A Virtual Machine Monitor. Technical Report 2007-08001, Parallel Processing Institute, Fudan University, Aug. 2007.
-
(2007)
-
-
Chen, H.1
Zhang, F.2
Chen, C.3
Chen, R.4
Zang, B.5
Yew, P.6
Mao, W.7
-
7
-
-
77957810674
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
X. Chen, T. Garfinkel, E. Lewis, P. Subrahmanyam, C. Waldspurger, D. Boneh, J. Dwoskin, and D. Ports. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. Proceedings of the 13th international conference on Architectural support for programming languages and operating systems, pages 2-13, 2008.
-
(2008)
Proceedings of the 13th international conference on Architectural support for programming languages and operating systems
, pp. 2-13
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.3
Subrahmanyam, P.4
Waldspurger, C.5
Boneh, D.6
Dwoskin, J.7
Ports, D.8
-
8
-
-
85059766484
-
Live migration of virtual machines
-
C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A. Warfield. Live migration of virtual machines. In Proc. of NSDI, pages 273-286, 2005.
-
(2005)
Proc. of NSDI
, pp. 273-286
-
-
Clark, C.1
Fraser, K.2
Hand, S.3
Hansen, J.G.4
Jul, E.5
Limpach, C.6
Pratt, I.7
Warfield, A.8
-
9
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: a virtual machine-based platform for trusted computing. In Proc. of SOSP'03, pages 193-206, 2003.
-
(2003)
Proc. of SOSP'03
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
10
-
-
24944454415
-
-
Master's thesis, Dept. of Computer Science, University of Copenhagen, Denmark
-
J. Hansen and A. Henriksen. Nomadic operating systems. Master's thesis, Dept. of Computer Science, University of Copenhagen, Denmark, 2002.
-
(2002)
Nomadic operating systems
-
-
Hansen, J.1
Henriksen, A.2
-
11
-
-
24944584954
-
Intel. LaGrande Technology Architectural Overview
-
Technical Report 252491-001, Intel Corporation, Sep
-
Intel. LaGrande Technology Architectural Overview. Technical Report 252491-001, Intel Corporation, Sep. 2003.
-
(2003)
-
-
-
12
-
-
38049026664
-
An open trusted computing architecture - secure virtual machines enabling user-defined policy enforcement
-
Technical Report RZ3655, IBM Research
-
D. Kuhlmann, R. Landfermann, H. Ramasamy, M. Schunter, G. Ramunno, and D. Vernizzi. An open trusted computing architecture - secure virtual machines enabling user-defined policy enforcement. Technical Report RZ3655, IBM Research, 2006.
-
(2006)
-
-
Kuhlmann, D.1
Landfermann, R.2
Ramasamy, H.3
Schunter, M.4
Ramunno, G.5
Vernizzi, D.6
-
16
-
-
33646445517
-
NGSCB: A Trusted Open System
-
M. Peinado, Y. Chen, P. England, and J. Manferdelli. NGSCB: A Trusted Open System. In Proc. ACISP, pages 86-97, 2004.
-
(2004)
Proc. ACISP
, pp. 86-97
-
-
Peinado, M.1
Chen, Y.2
England, P.3
Manferdelli, J.4
-
17
-
-
51949119355
-
J. Griffin, and S. Berger. sHype: Secure Hypervisor Approach to Trusted Virtualized Systems
-
Technical Report RC23511, IBM Research, Feb
-
R. Sailer, E. Valdez, T. Jaeger, R. Perez, L. van Doorn, J. Griffin, and S. Berger. sHype: Secure Hypervisor Approach to Trusted Virtualized Systems. Technical Report RC23511, IBM Research, Feb. 2005.
-
(2005)
-
-
Sailer, R.1
Valdez, E.2
Jaeger, T.3
Perez, R.4
van Doorn, L.5
-
18
-
-
84978370540
-
Optimizing the migration of virtual computers
-
Boston, MA, USA, December
-
C. P. Sapuntzakis, R. Chandra, B. Pfaff, J. Chow, M. S. Lam, and M. Rosenblum. Optimizing the migration of virtual computers. In Proceedings of the Fifth Symposium on Operating Systems Design and Implementation(OSDI), pages 377-390, Boston, MA, USA., December 2002.
-
(2002)
Proceedings of the Fifth Symposium on Operating Systems Design and Implementation(OSDI)
, pp. 377-390
-
-
Sapuntzakis, C.P.1
Chandra, R.2
Pfaff, B.3
Chow, J.4
Lam, M.S.5
Rosenblum, M.6
-
19
-
-
23444440332
-
Trusted computing using AMD Pacifica and Presidio secure virtual machine technology
-
10(2):120-132, 2005
-
G. Strongin. Trusted computing using AMD Pacifica and Presidio secure virtual machine technology. Information Security Technical Report, 10(2):120-132, 2005.
-
Information Security Technical Report
-
-
Strongin, G.1
-
20
-
-
58049172615
-
L4Ka::Pistachio Whitepaper
-
System Architecture Group
-
System Architecture Group. L4Ka::Pistachio Whitepaper. White paper, University of Karlsruhe, Germany, 2003.
-
(2003)
White paper, University of Karlsruhe, Germany
-
-
-
21
-
-
85069458084
-
Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable
-
R. Ta-Min, L. Litty, and D. Lie. Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable. In Proc. of OSDI'06, pages 279-292, 2006.
-
(2006)
Proc. of OSDI'06
, pp. 279-292
-
-
Ta-Min, R.1
Litty, L.2
Lie, D.3
|