메뉴 건너뛰기




Volumn 34, Issue 4, 2011, Pages 1113-1122

Secure virtualization for cloud computing

Author keywords

Cloud computing; Security; Virtualization technologies

Indexed keywords

ADOPTION AND DIFFUSION; CLOUD PROVIDERS; NOVEL ARCHITECTURE; OPEN-SOURCE SOLUTIONS; PERFORMANCE EVALUATION; PROTECTION SYSTEMS; SECURITY; SECURITY BREACHES; SECURITY ISSUES; SECURITY MANAGEMENT; VIRTUAL MACHINES; VIRTUALIZATIONS;

EID: 78650558794     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2010.06.008     Document Type: Article
Times cited : (286)

References (11)
  • 4
    • 54049127315 scopus 로고    scopus 로고
    • Forensics examination of volatile system data using virtual introspection
    • B. Hay, and K. Nance Forensics examination of volatile system data using virtual introspection SIGOPS Oper. Syst. Rev. 42 3 2008 74 82
    • (2008) SIGOPS Oper. Syst. Rev. , vol.42 , Issue.3 , pp. 74-82
    • Hay, B.1    Nance, K.2
  • 9
    • 33746953456 scopus 로고    scopus 로고
    • Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques
    • DOI 10.1016/j.jpdc.2006.04.009, PII S074373150600089X
    • M. Smith, T. Friese, M. Engel, and B. Freisleben Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques J. Parallel Distrib. Comput. 66 9 2006 1189 1204 (Pubitemid 44205398)
    • (2006) Journal of Parallel and Distributed Computing , vol.66 , Issue.9 , pp. 1189-1204
    • Smith, M.1    Friese, T.2    Engel, M.3    Freisleben, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.