메뉴 건너뛰기




Volumn , Issue , 2008, Pages 9-18

PALM: Security preserving VM live migration for systems with VMM-enforced protection

Author keywords

[No Author keywords available]

Indexed keywords

COMMODITY OPERATING SYSTEMS; DISTRIBUTED COMPUTING; EXECUTION ENVIRONMENTS; LOAD BALANCES; MIGRATION SYSTEMS; PERFORMANCE DEGRADATIONS; PROTECTION LEVELS; PROTECTION SYSTEMS; PROTOTYPE SYSTEMS; SECURITY VULNERABILITIES; VIRTUAL MACHINE MONITORS; VIRTUAL MACHINES;

EID: 58049137106     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/APTC.2008.15     Document Type: Conference Paper
Times cited : (44)

References (23)
  • 2
    • 0030092390 scopus 로고    scopus 로고
    • Checking for Race Conditions in File Accesses
    • M. Bishop and M. Dilger. Checking for Race Conditions in File Accesses. Computing Systems, 2(2):131-152, 1996.
    • (1996) Computing Systems , vol.2 , Issue.2 , pp. 131-152
    • Bishop, M.1    Dilger, M.2
  • 5
    • 58049139900 scopus 로고    scopus 로고
    • Tamper-Resistant Execution in an Untrusted Operating System Using A Virtual Machine Monitor
    • Technical Report 2007-08001, Parallel Processing Institute, Fudan University, Aug
    • H. Chen, F. Zhang, C. Chen, R. Chen, B. Zang, P. Yew, and W. Mao. Tamper-Resistant Execution in an Untrusted Operating System Using A Virtual Machine Monitor. Technical Report 2007-08001, Parallel Processing Institute, Fudan University, Aug. 2007.
    • (2007)
    • Chen, H.1    Zhang, F.2    Chen, C.3    Chen, R.4    Zang, B.5    Yew, P.6    Mao, W.7
  • 10
    • 24944454415 scopus 로고    scopus 로고
    • Master's thesis, Dept. of Computer Science, University of Copenhagen, Denmark
    • J. Hansen and A. Henriksen. Nomadic operating systems. Master's thesis, Dept. of Computer Science, University of Copenhagen, Denmark, 2002.
    • (2002) Nomadic operating systems
    • Hansen, J.1    Henriksen, A.2
  • 11
    • 24944584954 scopus 로고    scopus 로고
    • Intel. LaGrande Technology Architectural Overview
    • Technical Report 252491-001, Intel Corporation, Sep
    • Intel. LaGrande Technology Architectural Overview. Technical Report 252491-001, Intel Corporation, Sep. 2003.
    • (2003)
  • 12
    • 38049026664 scopus 로고    scopus 로고
    • An open trusted computing architecture - secure virtual machines enabling user-defined policy enforcement
    • Technical Report RZ3655, IBM Research
    • D. Kuhlmann, R. Landfermann, H. Ramasamy, M. Schunter, G. Ramunno, and D. Vernizzi. An open trusted computing architecture - secure virtual machines enabling user-defined policy enforcement. Technical Report RZ3655, IBM Research, 2006.
    • (2006)
    • Kuhlmann, D.1    Landfermann, R.2    Ramasamy, H.3    Schunter, M.4    Ramunno, G.5    Vernizzi, D.6
  • 17
    • 51949119355 scopus 로고    scopus 로고
    • J. Griffin, and S. Berger. sHype: Secure Hypervisor Approach to Trusted Virtualized Systems
    • Technical Report RC23511, IBM Research, Feb
    • R. Sailer, E. Valdez, T. Jaeger, R. Perez, L. van Doorn, J. Griffin, and S. Berger. sHype: Secure Hypervisor Approach to Trusted Virtualized Systems. Technical Report RC23511, IBM Research, Feb. 2005.
    • (2005)
    • Sailer, R.1    Valdez, E.2    Jaeger, T.3    Perez, R.4    van Doorn, L.5
  • 19
    • 23444440332 scopus 로고    scopus 로고
    • Trusted computing using AMD Pacifica and Presidio secure virtual machine technology
    • 10(2):120-132, 2005
    • G. Strongin. Trusted computing using AMD Pacifica and Presidio secure virtual machine technology. Information Security Technical Report, 10(2):120-132, 2005.
    • Information Security Technical Report
    • Strongin, G.1
  • 20
  • 21
    • 85069458084 scopus 로고    scopus 로고
    • Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable
    • R. Ta-Min, L. Litty, and D. Lie. Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable. In Proc. of OSDI'06, pages 279-292, 2006.
    • (2006) Proc. of OSDI'06 , pp. 279-292
    • Ta-Min, R.1    Litty, L.2    Lie, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.