-
1
-
-
84864434012
-
-
Accessed 10 Nov
-
3-way handshake. http://www. 3wayhandshake. com. Accessed 10 Nov 2010.
-
(2010)
3-way handshake
-
-
-
2
-
-
84864434011
-
-
ATA over Ethernet, Accessed 10 Nov
-
ATA over Ethernet. http://en. wikipedia. org/wiki/ATA_over_Ethernet. Accessed 10 Nov 2010.
-
(2010)
-
-
-
3
-
-
58349099411
-
A prioritized chinese wall model for managing the covert information flows in virtual machine systems
-
IEEE, New York
-
Cheng, G., Jin, H., Zou, D., Ohoussou, A., Zhao, F.: A prioritized chinese wall model for managing the covert information flows in virtual machine systems. In: ICYCS 2008. The 9th International Conference for Young Computer Scientists, pp. 1481-1487. IEEE, New York (2008).
-
(2008)
ICYCS 2008. The 9th International Conference for Young Computer Scientists
, pp. 1481-1487
-
-
Cheng, G.1
Jin, H.2
Zou, D.3
Ohoussou, A.4
Zhao, F.5
-
4
-
-
85059766484
-
Live migration of virtual machines
-
USENIX Association, Boston
-
Clark, C., Fraser, K., Hand, S., Hansen, J., Jul, E., Limpach, C., Pratt, I., Warfield, A.: Live migration of virtual machines. In: Proceedings of the 2nd Conference on Symposium on Networked Systems Design and Implementation, vol. 2, pp. 273-286. USENIX Association, Boston (2005).
-
(2005)
Proceedings of the 2nd Conference on Symposium on Networked Systems Design and Implementation
, vol.2
, pp. 273-286
-
-
Clark, C.1
Fraser, K.2
Hand, S.3
Hansen, J.4
Jul, E.5
Limpach, C.6
Pratt, I.7
Warfield, A.8
-
5
-
-
84864472302
-
-
Full-virtualization, Accessed 10 Nov
-
Full-virtualization. http://en. wikipedia. org/wiki/Full_virtualization. Accessed 10 Nov 2010.
-
(2010)
-
-
-
8
-
-
34548023942
-
Managing the risk of covert information flows in virtual machine systems
-
ACM, New York
-
Jaeger, T., Sailer, R., Sreenivasan, Y.: Managing the risk of covert information flows in virtual machine systems. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, pp. 81-90. ACM, New York (2007).
-
(2007)
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
, pp. 81-90
-
-
Jaeger, T.1
Sailer, R.2
Sreenivasan, Y.3
-
10
-
-
79959438605
-
-
Master's thesis, University of Oslo, Oslo University College (UiO/HiO), Oslo, Norway
-
Mevag, I.: Towards automatic management and live migration of virtual machines. Master's thesis, University of Oslo, Oslo University College (UiO/HiO), Oslo, Norway (2007).
-
(2007)
Towards automatic management and live migration of virtual machines
-
-
Mevag, I.1
-
12
-
-
32444450372
-
Embedding Covert Channels into TCP/IP
-
Berlin: Springer
-
Murdoch S., Lewis S.: Embedding covert channels into TCP/IP. In: Information Hiding, pp. 247-261. Springer, Berlin (2005).
-
(2005)
Information Hiding
, pp. 247-261
-
-
Murdoch, S.1
Lewis, S.2
-
15
-
-
84864472300
-
-
Paravirtualization. Accessed 10 Nov
-
Paravirtualization. http://en. wikipedia. org/wiki/Paravirtualization. Accessed 10 Nov 2010.
-
(2010)
-
-
-
16
-
-
74049152260
-
Hey, You, get off of my cloud: exploring information leakage in third-party compute clouds
-
ACM, New York
-
Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, You, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 199-212. ACM, New York (2009).
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
17
-
-
20344383743
-
Virtual machine monitors: current technology and future trends
-
Rosenblum M., Garfinkel T.: Virtual machine monitors: current technology and future trends. Computer 38(5), 39-47 (2005).
-
(2005)
Computer
, vol.38
, Issue.5
, pp. 39-47
-
-
Rosenblum, M.1
Garfinkel, T.2
-
18
-
-
84864456357
-
-
Rredhat virtualization guide. Accessed 10 Nov 2010
-
Rredhat virtualization guide. http://www. centos. org/docs/5/html/5. 1/pdf/Virtualization. pdf. Accessed 10 Nov 2010.
-
(2010)
-
-
-
22
-
-
84864472303
-
-
TCP sequence prediction attack. Accessed 10 Nov
-
TCP sequence prediction attack. http://en. wikipedia. org/wiki/TCP_Sequence_Prediction_Attack. Accessed 10 Nov 2010.
-
(2010)
-
-
-
23
-
-
84864456358
-
-
Transmission Control Protocol. Accessed 10 Nov
-
Transmission Control Protocol. http://en. wikipedia. org/wiki/Transmission_Control_Protocol. Accessed 10 Nov 2010.
-
(2010)
-
-
-
25
-
-
84864456360
-
-
Virtualization Security Survey, Accessed 10 Nov 2010
-
Virtualization Security Survey. http://www. prismmicrosys. com/documents/VirtualizationSecuritySurvey2010. pdf (2010). Accessed 10 Nov 2010.
-
(2010)
-
-
-
26
-
-
77958069314
-
Secured and reliable VM migration in personal cloud
-
IEEE, New York
-
Wang, W., Zhang, Y., Lin, B., Wu, X., Miao, K.: Secured and reliable VM migration in personal cloud. In: 2nd International Conference on Computer Engineering and Technology (ICCET), vol. 1, pp. V1-705. IEEE, New York (2010).
-
(2010)
2nd International Conference on Computer Engineering and Technology (ICCET)
, vol.1
-
-
Wang, W.1
Zhang, Y.2
Lin, B.3
Wu, X.4
Miao, K.5
|