메뉴 건너뛰기




Volumn 21, Issue 4, 2013, Pages 562-587

Security-preserving live migration of virtual machines in the cloud

Author keywords

Cloud; Live migration; Privacy protection; Virtual machine

Indexed keywords

COMMODITY OPERATING SYSTEMS; EXECUTION ENVIRONMENTS; LIVE MIGRATIONS; OFF-THE-SHELF HARDWARES; PERFORMANCE DEGRADATION; PRIVACY PROTECTION; TOTAL MIGRATION TIME; VIRTUAL MACHINES;

EID: 84885310053     PISSN: 10647570     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10922-012-9253-1     Document Type: Article
Times cited : (37)

References (57)
  • 3
    • 58049139900 scopus 로고    scopus 로고
    • Tamper-Resistant Execution in an Untrusted Operating System Using A Virtual Machine Monitor
    • Parallel Processing Institute, Fudan University, Aug 2007
    • Chen, H.; Zhang, F.; Chen, C.; Chen, R.; Zang, B.; Yew, P.; Mao, W.: Tamper-Resistant Execution in an Untrusted Operating System Using A Virtual Machine Monitor. Technical Report 2007-08001, Parallel Processing Institute, Fudan University, Aug 2007
    • Technical Report 2007-08001
    • Chen, H.1    Zhang, F.2    Chen, C.3    Chen, R.4    Zang, B.5    Yew, P.6    Mao, W.7
  • 6
    • 35348963573 scopus 로고    scopus 로고
    • Daonity-grid security from two levels of virtualization
    • 10.1016/j.istr.2007.05.005
    • Chen, H.; Chen, J.; Mao, W.; Yan, F.: Daonity-grid security from two levels of virtualization. Inf. Secur. Tech. Rep. 12(3), 123-138 (2007)
    • (2007) Inf. Secur. Tech. Rep. , vol.12 , Issue.3 , pp. 123-138
    • Chen, H.1    Chen, J.2    Mao, W.3    Yan, F.4
  • 12
    • 0016336411 scopus 로고
    • Operating system integrity in OS/VS2
    • McPhee, W.S.: Operating system integrity in OS/VS2. IBM J. Res. Dev. 13(3), 230 (1974)
    • (1974) IBM J. Res. Dev. , vol.13 , Issue.3 , pp. 230
    • McPhee, W.S.1
  • 13
    • 0030092390 scopus 로고    scopus 로고
    • Checking for race conditions in file accesses
    • Bishop, M.; Dilger, M.: Checking for race conditions in file accesses. Comput. Syst. 2(2), 131-152 (1996)
    • (1996) Comput. Syst. , vol.2 , Issue.2 , pp. 131-152
    • Bishop, M.1    Dilger, M.2
  • 19
    • 70350699446 scopus 로고    scopus 로고
    • Cache missing for fun and profit
    • Ottawa, Canada
    • Percival, C.: Cache missing for fun and profit. In: Proceedings of BSDCan, Ottawa, Canada, 2005. http://www.daemonology.net/hyperthreading- considered-harmful
    • (2005) Proceedings of BSDCan
    • Percival, C.1
  • 26
    • 84885299484 scopus 로고    scopus 로고
    • Tom Espiner
    • Tom Espiner: http://news.zdnet.co.uk/security/0,1000000189,39290616,00. htm, 2007
    • (2007)
  • 27
    • 84885301792 scopus 로고    scopus 로고
    • Amazon. Amazon web services customer agreement, Oct 2009
    • Amazon. Amazon web services customer agreement, Oct 2009. http://aws.amazon.com/agreement/#7
  • 33
    • 84885327279 scopus 로고    scopus 로고
    • EMC Corp. Daoli trust cloud infrastructure
    • EMC Corp. Daoli trust cloud infrastructure. http://www.daoliproject.org/, 2007
    • (2007)
  • 36
    • 24944454415 scopus 로고    scopus 로고
    • Master's thesis, Depaerment of Computer Science, University of Copenhagen, Denmark
    • Hansen, J.G.; Henriksen, A.K.: Nomadic operating systems. Master's thesis, Depaerment of Computer Science, University of Copenhagen, Denmark (2002)
    • (2002) Nomadic Operating Systems
    • Hansen, J.G.1    Henriksen, A.K.2
  • 41
    • 84885319703 scopus 로고    scopus 로고
    • VMware Corp
    • VMware Corp. Virtual Infrastructure 3, 2007. http://www.vmware.com/ products/vi
    • (2007) Virtual Infrastructure 3
  • 44
    • 38049026664 scopus 로고    scopus 로고
    • An open trusted computing architecture-secure virtual machines enabling user-defined policy enforcement
    • IBM Research
    • Kuhlmann, D.; Landfermann, R.; Ramasamy, H.; Schunter, M.; Ramunno, G.; Vernizzi, D.: An open trusted computing architecture-secure virtual machines enabling user-defined policy enforcement. Technical Report RZ3655, IBM Research, 2006. http://www.opentc.net/activities/otc-HighLevelOverview/OTC-Architecture- High-level-overview.pdf
    • (2006) Technical Report RZ3655
    • Kuhlmann, D.1    Landfermann, R.2    Ramasamy, H.3    Schunter, M.4    Ramunno, G.5    Vernizzi, D.6
  • 45
    • 84885329022 scopus 로고    scopus 로고
    • System Architecture Group White paper, University of Karlsruhe, Germany
    • System Architecture Group. L4Ka::Pistachio Whitepaper. White paper, University of Karlsruhe, Germany (2003)
    • (2003) L4Ka::Pistachio Whitepaper
  • 48
    • 84885294884 scopus 로고    scopus 로고
    • Intel Corp. Intel Trusted Execution Technology, 2008
    • Intel Corp. Intel Trusted Execution Technology, 2008. http://www.intel.com/technology/security
  • 49
    • 24944584954 scopus 로고    scopus 로고
    • Intel Technical Report 252491-001, Intel Corporation, Sep. 2003
    • Intel. LaGrande Technology Architectural Overview. Technical Report 252491-001, Intel Corporation, Sep. 2003
    • LaGrande Technology Architectural Overview
  • 50
    • 23444440332 scopus 로고    scopus 로고
    • Trusted computing using AMD
    • 1441432 10.1016/j.istr.2005.05.006
    • Strongin, G.: Trusted computing using AMD. Inf. Secur. Tech. Rep. 10(2), 120-132 (2005)
    • (2005) Inf. Secur. Tech. Rep. , vol.10 , Issue.2 , pp. 120-132
    • Strongin, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.