메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1829-1836

Hypervisor-based background encryption

Author keywords

encryption; hypervisor

Indexed keywords

DEPLOYMENT COSTS; DISK IMAGES; ENCRYPTION SCHEMES; ENCRYPTION SYSTEM; EXISTING SYSTEMS; HYPERVISOR; PERFORMANCE PENALTIES;

EID: 84863599761     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2245276.2232073     Document Type: Conference Paper
Times cited : (3)

References (34)
  • 5
    • 80053150585 scopus 로고    scopus 로고
    • BitLocker Drive Encryption. http://windows.microsoft.com/en- US/windows7/products/features/bitlocker.
    • BitLocker Drive Encryption
  • 7
    • 84863569316 scopus 로고    scopus 로고
    • release 1.1, January
    • CE-Infosys. Compusec release 1.1, January 2003.
    • (2003) CE-Infosys. Compusec
  • 10
    • 84863576208 scopus 로고    scopus 로고
    • Futuremark Corporation. November
    • Futuremark Corporation. PCMark Vantage Whitepaper v1.0, November 2007.
    • (2007) PCMark Vantage Whitepaper V1.0
  • 12
    • 70449709794 scopus 로고    scopus 로고
    • Virtualization with kvm
    • February
    • I. Habib. Virtualization with kvm. Linux J., 2008, February 2008.
    • (2008) Linux J. , vol.2008
    • Habib, I.1
  • 13
    • 34447519122 scopus 로고    scopus 로고
    • Discryption: Internal Hard-Disk Encryption for Secure Storage
    • L. Hars. Discryption: Internal Hard-Disk Encryption for Secure Storage. Computer, 40:103-105, 2007.
    • (2007) Computer , vol.40 , pp. 103-105
    • Hars, L.1
  • 15
    • 77949441598 scopus 로고    scopus 로고
    • Stealthy malware detection and monitoring through vmm-based "gout-of-the-box" semantic view reconstruction
    • March
    • X. Jiang, X. Wang, and D. Xu. Stealthy malware detection and monitoring through vmm-based "gout-of-the-box" semantic view reconstruction. ACM Trans. Inf. Syst. Secur., 13:12:1-12:28, March 2010.
    • (2010) ACM Trans. Inf. Syst. Secur. , vol.13
    • Jiang, X.1    Wang, X.2    Xu, D.3
  • 16
    • 35048889770 scopus 로고    scopus 로고
    • Gbde-geom based disk encryption
    • P. H. Kamp. Gbde-geom based disk encryption. BSDCon 2003, 2003.
    • (2003) BSDCon 2003
    • Kamp, P.H.1
  • 18
    • 70449689649 scopus 로고    scopus 로고
    • Taking a Hard-Line Approach to Encryption
    • C. Laird. Taking a Hard-Line Approach to Encryption. Computer, 40:13-15, 2007.
    • (2007) Computer , vol.40 , pp. 13-15
    • Laird, C.1
  • 23
    • 84863576372 scopus 로고    scopus 로고
    • Moka5. http://www.moka5.com/.
  • 31
    • 84863587926 scopus 로고    scopus 로고
    • TrueCrypt. http://www.truecrypt.org/.
    • TrueCrypt
  • 32
    • 84863577986 scopus 로고    scopus 로고
    • VMware ACE. http://www.vmware.com/products/ace/.
    • VMware ACE
  • 33
    • 62349098595 scopus 로고    scopus 로고
    • Virtualbox: Bits and bytes masquerading as machines
    • February
    • J. Watson. Virtualbox: bits and bytes masquerading as machines. Linux J., 2008, February 2008.
    • (2008) Linux J. , vol.2008
    • Watson, J.1
  • 34
    • 84863577984 scopus 로고    scopus 로고
    • version 5.2 technical specifications
    • WinMagic. Securedoctm version 5.2 technical specifications, 2011.
    • (2011) WinMagic. Securedoctm


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.