-
1
-
-
20344389520
-
The architecture of virtual machines
-
J. Smith and R. Nair, "The architecture of virtual machines, " Computer, vol. 38, no. 5, pp. 32-38, 2005.
-
(2005)
Computer
, vol.38
, Issue.5
, pp. 32-38
-
-
Smith, J.1
Nair, R.2
-
2
-
-
0012903874
-
Analyzing the past to prepare for the future: Writing a literature review
-
J. Webster and R. T. Watson, "Analyzing the past to prepare for the future: Writing a literature review, " MIS Quarterly, vol. 26, pp. 13-23, 2002.
-
(2002)
MIS Quarterly
, vol.26
, pp. 13-23
-
-
Webster, J.1
Watson, R.T.2
-
4
-
-
70849106280
-
VMware inc ESX server 3.0.2 and virtualcenter 2.0.2
-
Corsec Security, ", ", EAL4+, Retrieved 2009-04-20
-
Corsec Security, "VMware Inc ESX Server 3.0.2 and VirtualCenter 2.0.2, " www.commoncriteriaportal.org/files/epfiles/vmware-sec-e.pdf, 2008, common Criteria Security Target, EAL4+, Retrieved 2009-04-20.
-
(2008)
Common Criteria Security Target
-
-
-
5
-
-
54049137283
-
Virtualization and hardware-based security
-
R. Perez, L. van Doorn, and R. Sailer, "Virtualization and Hardware-Based Security, " IEEE Security & Privacy, vol. 6, no. 5, pp. 24-31, 2008.
-
(2008)
IEEE Security & Privacy
, vol.6
, Issue.5
, pp. 24-31
-
-
Perez, R.1
Doorn, L.V.2
Sailer, R.3
-
6
-
-
51849093455
-
Architecting dependable and secure systems using virtualization
-
B. Jansen, H. Ramasamy, M. Schunter, and A. Tanner, "Architecting Dependable and Secure Systems Using Virtualization, " Lecture Notes In Computer Science, pp. 124-149, 2008.
-
(2008)
Lecture Notes in Computer Science
, pp. 124-149
-
-
Jansen, B.1
Ramasamy, H.2
Schunter, M.3
Tanner, A.4
-
7
-
-
20344391930
-
Intel virtualization technology
-
R. Uhlig, G. Neiger, D. Rodgers, A. Santoni, F. Martins, A. Anderson, S. Bennett, A. Kagi, F. Leung, and L. Smith, "Intel virtualization technology, " Computer, vol. 38, no. 5, pp. 48-56, 2005.
-
(2005)
Computer
, vol.38
, Issue.5
, pp. 48-56
-
-
Uhlig, R.1
Neiger, G.2
Rodgers, D.3
Santoni, A.4
Martins, F.5
Anderson, A.6
Bennett, S.7
Kagi, A.8
Leung, F.9
Smith, L.10
-
8
-
-
33745963937
-
Hardware virtualization trends
-
ACM New York, NY, USA
-
L. van Doorn, "Hardware virtualization trends, " in Proceedings of the 2nd international conference on Virtual execution environments. ACM New York, NY, USA, 2006, pp. 45-45.
-
(2006)
Proceedings of the 2nd International Conference on Virtual Execution Environments
, pp. 45-45
-
-
Doorn, L.V.1
-
9
-
-
70349250387
-
Traps, events, emulation, and enforcement: Managing the yin and yang of virtualization-based security
-
New York, NY, USA: ACM
-
S. Bratus, M. Locasto, A. Ramaswamy, and S. Smith, "Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security, " in VMSec '08: Proceedings of the 1st ACM workshop on Virtual machine security. New York, NY, USA: ACM, 2008, pp. 49-58.
-
(2008)
VMSec '08: Proceedings of the 1st ACM Workshop on Virtual Machine Security
, pp. 49-58
-
-
Bratus, S.1
Locasto, M.2
Ramaswamy, A.3
Smith, S.4
-
10
-
-
69549144225
-
-
February, version 1.0.0, Retrieved 2009-04-20
-
Distributed Management Task Force, Inc., "Open virtualization format specification, " www.dmtf.org/standards/publisheddocuments/DSP02431.0.0. pdf, February 2009, version 1.0.0, Retrieved 2009-04-20.
-
(2009)
Open Virtualization Format Specification
-
-
-
11
-
-
85006619109
-
The virtualization reality
-
S. Crosby and D. Brown, "The virtualization reality, " Queue, vol. 4, no. 10, pp. 34-41, 2007.
-
(2007)
Queue
, vol.4
, Issue.10
, pp. 34-41
-
-
Crosby, S.1
Brown, D.2
-
12
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
B. D. Payne, M. Carbone, M. Sharif, and W. Lee, "Lares: An architecture for secure active monitoring using virtualization, " Security and Privacy, IEEE Symposium on, pp. 233-247, 2008.
-
(2008)
Security and Privacy, IEEE Symposium on
, pp. 233-247
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
13
-
-
54049158161
-
I/O for virtual machine monitors: Security and performance issues
-
P. Karger and D. Safford, "I/O for Virtual Machine Monitors: Security and Performance Issues, " IEEE Security & Privacy, vol. 6, no. 5, pp. 16-23, 2008.
-
(2008)
IEEE Security & Privacy
, vol.6
, Issue.5
, pp. 16-23
-
-
Karger, P.1
Safford, D.2
-
14
-
-
70849121334
-
-
retrieved 2009-03-18
-
VMware, "VMware ESXi 3.5 datasheet, " www.vmware.com/files/pdf/ vmware-esxi-datasheet.pdf, 2008, retrieved 2009-03-18.
-
(2008)
VMware ESXi 3.5 Datasheet
-
-
-
15
-
-
70849091604
-
An empirical study into the security exposure to host of hostile virtualized environments
-
Vancouver BC, April
-
T. Ormandy, "An empirical study into the security exposure to host of hostile virtualized environments, " in CanSecWest 2007, Vancouver BC, April 2007.
-
(2007)
CanSecWest 2007
-
-
Ormandy, T.1
-
16
-
-
70849107134
-
-
April, retrieved 2009-04-20
-
NIST, "CVE-2009-1244, " http://web.nvd.nist.gov/view/vuln/ detail?vulnId=CVE-2009-1244, April 2009, retrieved 2009-04-20.
-
(2009)
CVE-2009-1244
-
-
-
17
-
-
67651028508
-
What virtualization can do for security
-
December
-
T. Garfinkel and A. Warfield, "What virtualization can do for security, ";LOGIN:, vol. 32, no. 6, pp. 28-34, December 2007.
-
(2007)
LOGIN
, vol.32
, Issue.6
, pp. 28-34
-
-
Garfinkel, T.1
Warfield, A.2
-
18
-
-
84978401615
-
Revirt: Enabling intrusion analysis through virtual-machine logging and replay
-
New York, NY, USA: ACM
-
G. Dunlap, S. T. King, S. Cinar, M. Basrai, and P. Chen, "Revirt: Enabling intrusion analysis through virtual-machine logging and replay, " in In Proceedings of the 2002 Symposium on Operating Systems Design and Implementation (OSDI). New York, NY, USA: ACM, 2002, pp. 211-224.
-
(2002)
In Proceedings of the 2002 Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 211-224
-
-
Dunlap, G.1
King, S.T.2
Cinar, S.3
Basrai, M.4
Chen, P.5
-
19
-
-
54049106582
-
Virtual machine introspection: Observation or interference?
-
K. Nance, M. Bishop, and B. Hay, "Virtual Machine Introspection: Observation or Interference?" IEEE Security & Privacy, vol. 6, no. 5, pp. 32-37, 2008.
-
(2008)
IEEE Security & Privacy
, vol.6
, Issue.5
, pp. 32-37
-
-
Nance, K.1
Bishop, M.2
Hay, B.3
-
21
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, "Terra: a virtual machine-based platform for trusted computing, " SIGOPS Oper. Syst. Rev., vol. 37, no. 5, pp. 193-206, 2003.
-
(2003)
SIGOPS Oper. Syst. Rev.
, vol.37
, Issue.5
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
22
-
-
84944386303
-
When virtual is harder than real: Security challenges in virtual machine based computing environments
-
T. Garfinkel and M. Rosenblum, "When virtual is harder than real: Security challenges in virtual machine based computing environments, " in 10th Workshop on Hot Topics in Operating Systems, 2005.
-
(2005)
10th Workshop on Hot Topics in Operating Systems
-
-
Garfinkel, T.1
Rosenblum, M.2
-
23
-
-
70849098872
-
-
retrieved 2009-04-20
-
Microsoft Corporation, "Windows Server 2008 Hyper-V Technical Overview, " http://www.microsoft.com/windowsserver2008/en/us/hyperv- overview.aspx, 2008, retrieved 2009-04-20.
-
(2008)
Windows Server 2008 Hyper-V Technical Overview
-
-
-
24
-
-
70849096088
-
-
retrieved 2009-03-18
-
VMware, "VMware VMotion datasheet, " www.vmware.com/pdf/ vmotion-datasheet.pdf, 2007, retrieved 2009-03-18.
-
(2007)
VMware VMotion Datasheet
-
-
-
25
-
-
70849114482
-
-
September, retrieved 2009-03-18
-
Citrix, "Xenserver administrator's guide, " support.citrix.com/servlet/KbServlet/download/18051-102-19048/reference.pdf, September 2008, retrieved 2009-03-18.
-
(2008)
Xenserver Administrator's Guide
-
-
-
27
-
-
20344383743
-
Virtual machine monitors: Current technology and future trends
-
M. Rosenblum and T. Garfinkel, "Virtual machine monitors: Current technology and future trends, " Computer, vol. 38, no. 5, pp. 39-47, 2005.
-
(2005)
Computer
, vol.38
, Issue.5
, pp. 39-47
-
-
Rosenblum, M.1
Garfinkel, T.2
-
28
-
-
70849098592
-
-
product datasheet, Retrieved 2009-04-20
-
VMware, "VMware vCenter Update Manager, " www.vmware.com/files/ pdf/update-manager-datasheet.pdf, 2008, product datasheet, Retrieved 2009-04-20.
-
(2008)
VMware VCenter Update Manager
-
-
-
29
-
-
58049183414
-
Security consideration for virtualization
-
Royal Holloway, Egham, Surrey TW20 0EX, England
-
C. Gebhardt and A. Tomlinson, "Security consideration for virtualization, " Royal Holloway, University of London, Egham, Surrey TW20 0EX, England, Tech. Rep. RHUL-MA-2008-16, 2008.
-
(2008)
University of London, Tech. Rep. RHUL-MA-2008-16
-
-
Gebhardt, C.1
Tomlinson, A.2
-
30
-
-
49949095440
-
Virtualization sparks security concerns
-
S. Vaughan-Nichols, "Virtualization Sparks Security Concerns, " Computer, vol. 41, no. 8, pp. 13-15, 2008.
-
(2008)
Computer
, vol.41
, Issue.8
, pp. 13-15
-
-
Vaughan-Nichols, S.1
-
31
-
-
78651061305
-
-
retrieved 2009-06-25
-
The Register, "Webhost hack wipes out data for 100, 000 sites, " http://www.theregister.co.uk/2009/06/08/webhostattack/, 2009, retrieved 2009-06-25.
-
(2009)
Webhost Hack Wipes Out Data for 100, 000 Sites
-
-
|