메뉴 건너뛰기




Volumn 3, Issue , 2009, Pages 353-358

Security implications of virtualization: A literature study

Author keywords

[No Author keywords available]

Indexed keywords

BOUNDEDNESS; DATA CENTERS; DEDICATED HARDWARE; KEY TECHNOLOGIES; MONOTONICITY; ON-DEMAND; POSITIVE EFFECTS; PRIVATE DATA; SECURITY IMPLICATIONS; SYSTEMATIC LITERATURE REVIEW; VIRTUALIZATIONS;

EID: 70849097492     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSE.2009.267     Document Type: Conference Paper
Times cited : (44)

References (31)
  • 1
    • 20344389520 scopus 로고    scopus 로고
    • The architecture of virtual machines
    • J. Smith and R. Nair, "The architecture of virtual machines, " Computer, vol. 38, no. 5, pp. 32-38, 2005.
    • (2005) Computer , vol.38 , Issue.5 , pp. 32-38
    • Smith, J.1    Nair, R.2
  • 2
    • 0012903874 scopus 로고    scopus 로고
    • Analyzing the past to prepare for the future: Writing a literature review
    • J. Webster and R. T. Watson, "Analyzing the past to prepare for the future: Writing a literature review, " MIS Quarterly, vol. 26, pp. 13-23, 2002.
    • (2002) MIS Quarterly , vol.26 , pp. 13-23
    • Webster, J.1    Watson, R.T.2
  • 4
    • 70849106280 scopus 로고    scopus 로고
    • VMware inc ESX server 3.0.2 and virtualcenter 2.0.2
    • Corsec Security, ", ", EAL4+, Retrieved 2009-04-20
    • Corsec Security, "VMware Inc ESX Server 3.0.2 and VirtualCenter 2.0.2, " www.commoncriteriaportal.org/files/epfiles/vmware-sec-e.pdf, 2008, common Criteria Security Target, EAL4+, Retrieved 2009-04-20.
    • (2008) Common Criteria Security Target
  • 5
    • 54049137283 scopus 로고    scopus 로고
    • Virtualization and hardware-based security
    • R. Perez, L. van Doorn, and R. Sailer, "Virtualization and Hardware-Based Security, " IEEE Security & Privacy, vol. 6, no. 5, pp. 24-31, 2008.
    • (2008) IEEE Security & Privacy , vol.6 , Issue.5 , pp. 24-31
    • Perez, R.1    Doorn, L.V.2    Sailer, R.3
  • 10
    • 69549144225 scopus 로고    scopus 로고
    • February, version 1.0.0, Retrieved 2009-04-20
    • Distributed Management Task Force, Inc., "Open virtualization format specification, " www.dmtf.org/standards/publisheddocuments/DSP02431.0.0. pdf, February 2009, version 1.0.0, Retrieved 2009-04-20.
    • (2009) Open Virtualization Format Specification
  • 11
    • 85006619109 scopus 로고    scopus 로고
    • The virtualization reality
    • S. Crosby and D. Brown, "The virtualization reality, " Queue, vol. 4, no. 10, pp. 34-41, 2007.
    • (2007) Queue , vol.4 , Issue.10 , pp. 34-41
    • Crosby, S.1    Brown, D.2
  • 13
    • 54049158161 scopus 로고    scopus 로고
    • I/O for virtual machine monitors: Security and performance issues
    • P. Karger and D. Safford, "I/O for Virtual Machine Monitors: Security and Performance Issues, " IEEE Security & Privacy, vol. 6, no. 5, pp. 16-23, 2008.
    • (2008) IEEE Security & Privacy , vol.6 , Issue.5 , pp. 16-23
    • Karger, P.1    Safford, D.2
  • 14
    • 70849121334 scopus 로고    scopus 로고
    • retrieved 2009-03-18
    • VMware, "VMware ESXi 3.5 datasheet, " www.vmware.com/files/pdf/ vmware-esxi-datasheet.pdf, 2008, retrieved 2009-03-18.
    • (2008) VMware ESXi 3.5 Datasheet
  • 15
    • 70849091604 scopus 로고    scopus 로고
    • An empirical study into the security exposure to host of hostile virtualized environments
    • Vancouver BC, April
    • T. Ormandy, "An empirical study into the security exposure to host of hostile virtualized environments, " in CanSecWest 2007, Vancouver BC, April 2007.
    • (2007) CanSecWest 2007
    • Ormandy, T.1
  • 16
    • 70849107134 scopus 로고    scopus 로고
    • April, retrieved 2009-04-20
    • NIST, "CVE-2009-1244, " http://web.nvd.nist.gov/view/vuln/ detail?vulnId=CVE-2009-1244, April 2009, retrieved 2009-04-20.
    • (2009) CVE-2009-1244
  • 17
    • 67651028508 scopus 로고    scopus 로고
    • What virtualization can do for security
    • December
    • T. Garfinkel and A. Warfield, "What virtualization can do for security, ";LOGIN:, vol. 32, no. 6, pp. 28-34, December 2007.
    • (2007) LOGIN , vol.32 , Issue.6 , pp. 28-34
    • Garfinkel, T.1    Warfield, A.2
  • 19
    • 54049106582 scopus 로고    scopus 로고
    • Virtual machine introspection: Observation or interference?
    • K. Nance, M. Bishop, and B. Hay, "Virtual Machine Introspection: Observation or Interference?" IEEE Security & Privacy, vol. 6, no. 5, pp. 32-37, 2008.
    • (2008) IEEE Security & Privacy , vol.6 , Issue.5 , pp. 32-37
    • Nance, K.1    Bishop, M.2    Hay, B.3
  • 21
    • 21644455412 scopus 로고    scopus 로고
    • Terra: A virtual machine-based platform for trusted computing
    • T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, "Terra: a virtual machine-based platform for trusted computing, " SIGOPS Oper. Syst. Rev., vol. 37, no. 5, pp. 193-206, 2003.
    • (2003) SIGOPS Oper. Syst. Rev. , vol.37 , Issue.5 , pp. 193-206
    • Garfinkel, T.1    Pfaff, B.2    Chow, J.3    Rosenblum, M.4    Boneh, D.5
  • 22
    • 84944386303 scopus 로고    scopus 로고
    • When virtual is harder than real: Security challenges in virtual machine based computing environments
    • T. Garfinkel and M. Rosenblum, "When virtual is harder than real: Security challenges in virtual machine based computing environments, " in 10th Workshop on Hot Topics in Operating Systems, 2005.
    • (2005) 10th Workshop on Hot Topics in Operating Systems
    • Garfinkel, T.1    Rosenblum, M.2
  • 23
    • 70849098872 scopus 로고    scopus 로고
    • retrieved 2009-04-20
    • Microsoft Corporation, "Windows Server 2008 Hyper-V Technical Overview, " http://www.microsoft.com/windowsserver2008/en/us/hyperv- overview.aspx, 2008, retrieved 2009-04-20.
    • (2008) Windows Server 2008 Hyper-V Technical Overview
  • 24
    • 70849096088 scopus 로고    scopus 로고
    • retrieved 2009-03-18
    • VMware, "VMware VMotion datasheet, " www.vmware.com/pdf/ vmotion-datasheet.pdf, 2007, retrieved 2009-03-18.
    • (2007) VMware VMotion Datasheet
  • 25
    • 70849114482 scopus 로고    scopus 로고
    • September, retrieved 2009-03-18
    • Citrix, "Xenserver administrator's guide, " support.citrix.com/servlet/KbServlet/download/18051-102-19048/reference.pdf, September 2008, retrieved 2009-03-18.
    • (2008) Xenserver Administrator's Guide
  • 27
    • 20344383743 scopus 로고    scopus 로고
    • Virtual machine monitors: Current technology and future trends
    • M. Rosenblum and T. Garfinkel, "Virtual machine monitors: Current technology and future trends, " Computer, vol. 38, no. 5, pp. 39-47, 2005.
    • (2005) Computer , vol.38 , Issue.5 , pp. 39-47
    • Rosenblum, M.1    Garfinkel, T.2
  • 28
    • 70849098592 scopus 로고    scopus 로고
    • product datasheet, Retrieved 2009-04-20
    • VMware, "VMware vCenter Update Manager, " www.vmware.com/files/ pdf/update-manager-datasheet.pdf, 2008, product datasheet, Retrieved 2009-04-20.
    • (2008) VMware VCenter Update Manager
  • 30
    • 49949095440 scopus 로고    scopus 로고
    • Virtualization sparks security concerns
    • S. Vaughan-Nichols, "Virtualization Sparks Security Concerns, " Computer, vol. 41, no. 8, pp. 13-15, 2008.
    • (2008) Computer , vol.41 , Issue.8 , pp. 13-15
    • Vaughan-Nichols, S.1
  • 31
    • 78651061305 scopus 로고    scopus 로고
    • retrieved 2009-06-25
    • The Register, "Webhost hack wipes out data for 100, 000 sites, " http://www.theregister.co.uk/2009/06/08/webhostattack/, 2009, retrieved 2009-06-25.
    • (2009) Webhost Hack Wipes Out Data for 100, 000 Sites


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.