-
1
-
-
68249129760
-
-
Technical Report, EECS Department, University of California, Berkeley
-
M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, M. Zaharia, Above the clouds: a berkeley view of cloud computing, Technical Report, EECS Department, University of California, Berkeley, 2009.
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
63649117166
-
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
-
R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, and I. Brandic Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility Future Generation Computer Systems 25 6 2009 599 616
-
(2009)
Future Generation Computer Systems
, vol.25
, Issue.6
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
3
-
-
56349097363
-
-
Technical Report, ECSL-TR-129, SUNY at Stony Brook
-
S. Nanda, T. Chiueh, A survey on virtualization technologies, Technical Report, ECSL-TR-129, SUNY at Stony Brook, 2005.
-
(2005)
A Survey on Virtualization Technologies
-
-
Nanda, S.1
Chiueh, T.2
-
4
-
-
20344389520
-
The architecture of virtual machines
-
DOI 10.1109/MC.2005.173
-
J.E. Smith, and R. Nair The architecture of virtual machines IEEE Computer 38 5 2005 32 38 (Pubitemid 40784340)
-
(2005)
Computer
, vol.38
, Issue.5
, pp. 32-38
-
-
Smith, J.E.1
Nair, R.2
-
5
-
-
20344383743
-
Virtual machine monitors: Current technology and future trends
-
DOI 10.1109/MC.2005.176
-
M. Rosenblum, and T. Garfinkel Virtual machine monitors: current technology and future trends IEEE Computer 38 5 2005 39 47 (Pubitemid 40784341)
-
(2005)
Computer
, vol.38
, Issue.5
, pp. 39-47
-
-
Rosenblum, M.1
Garfinkel, T.2
-
6
-
-
84885959592
-
-
Cloudwatch
-
Cloudwatch: http://aws.amazon.com/cloudwatch/.
-
-
-
-
7
-
-
84885955667
-
-
Logicmonitor: http://www.logicmonitor.com/.
-
-
-
-
10
-
-
80053654165
-
CyberGuarder: A virtualization security assurance architecture for green cloud computing
-
J. Li, B. Li, T. Wo, C. Hu, J. Huai, L. Liu, and K.P. Lam CyberGuarder: a virtualization security assurance architecture for green cloud computing Future Generation Computer Systems 28 2 2012 379 390
-
(2012)
Future Generation Computer Systems
, vol.28
, Issue.2
, pp. 379-390
-
-
Li, J.1
Li, B.2
Wo, T.3
Hu, C.4
Huai, J.5
Liu, L.6
Lam, K.P.7
-
11
-
-
79751493181
-
Locking the sky: A survey on IaaS cloud security
-
L.M. Vaquero, L. Rodero-Merino, and D. Morn Locking the sky: a survey on IaaS cloud security Computing 91 1 2011 93 118
-
(2011)
Computing
, vol.91
, Issue.1
, pp. 93-118
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Morn, D.3
-
12
-
-
74049145643
-
Secure in-VM monitoring using hardware virtualization
-
M.I. Sharif, W. Lee, W. Cui, A. Lanzi, Secure in-VM monitoring using hardware virtualization, in: Proc. of the 16th ACM Conference on Computer and Communications Security, 2009, pp. 477-487.
-
(2009)
Proc. of the 16th ACM Conference on Computer and Communications Security
, pp. 477-487
-
-
Sharif, M.I.1
Lee, W.2
Cui, W.3
Lanzi, A.4
-
13
-
-
84885954754
-
-
Opennebula: http://www.opennebula.org/.
-
-
-
-
14
-
-
78650529700
-
VMDriver: A driver-based monitoring mechanism for virtualization
-
G. Xiang, H. Jin, D. Zou, X. Zhang, S. Wen, F. Zhao, VMDriver: a driver-based monitoring mechanism for virtualization, in: Proc. of the 29th International Symposium on Reliable Distributed Systems, 2010, pp. 72-81.
-
(2010)
Proc. of the 29th International Symposium on Reliable Distributed Systems
, pp. 72-81
-
-
Xiang, G.1
Jin, H.2
Zou, D.3
Zhang, X.4
Wen, S.5
Zhao, F.6
-
15
-
-
21644433634
-
Xen and the art of virtualization
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, A. Warfield, Xen and the art of virtualization, in: Proc. of the 19th ACM Symposium on Operating Systems Principles, 2003, pp. 164-177. (Pubitemid 40929695)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
16
-
-
85091115835
-
Xen and the art of repeated research
-
B. Clark, T. Deshane, E. Dow, S. Evanchik, M. Finlayson, J. Herne, J.N. Matthews, Xen and the art of repeated research, in: Proc. of the 2004 USENIX Annual Technical Conference, 2004, pp. 135-144.
-
(2004)
Proc. of the 2004 USENIX Annual Technical Conference
, pp. 135-144
-
-
Clark, B.1
Deshane, T.2
Dow, E.3
Evanchik, S.4
Finlayson, M.5
Herne, J.6
Matthews, J.N.7
-
17
-
-
34548088028
-
Xen 3.0 and the art of virtualization
-
I. Pratt, K. Fraser, S. Hand, C. Limpach, A. Warfield, D. Magenheimer, J. Nakajima, A. Mallick, Xen 3.0 and the art of virtualization, in: Proc. of the 2005 Linux Symposium, 2005, pp. 65-77.
-
(2005)
Proc. of the 2005 Linux Symposium
, pp. 65-77
-
-
Pratt, I.1
Fraser, K.2
Hand, S.3
Limpach, C.4
Warfield, A.5
Magenheimer, D.6
Nakajima, J.7
Mallick, A.8
-
18
-
-
84885957228
-
-
VMware incorporation, introduction to VMware infrastructure. Available: http://www.vmware.com/pdf/vi3-35/esx-3/r35/vi3-35-25-intro-vi.pdf.
-
Introduction to VMware Infrastructure
-
-
-
19
-
-
84885954634
-
-
Virtual PC
-
Virtual PC: http://www.microsoft.com/windows/virtual-pc/.
-
-
-
-
21
-
-
48649085344
-
Secure and flexible monitoring of virtual machines
-
B.D. Payne, M.D.P.A. Carbone, W. Lee, Secure and flexible monitoring of virtual machines, in: Proc. of the 23rd Annual Computer Security Applications Conference, 2007, pp. 385-397.
-
(2007)
Proc. of the 23rd Annual Computer Security Applications Conference
, pp. 385-397
-
-
Payne, B.D.1
Carbone, M.D.P.A.2
Lee, W.3
-
22
-
-
84885949554
-
-
VMsafe
-
VMsafe: http://www.vmware.com/technical-resourcces/security/vmsafe.html.
-
-
-
-
23
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
B.D. Payne, M. Carbone, M. Sharif, W. Lee, Lares: an architecture for secure active monitoring using virtualization, in: Proc. of the 2008 IEEE Symposium on Security and Privacy, 2008, pp. 233-247.
-
(2008)
Proc. of the 2008 IEEE Symposium on Security and Privacy
, pp. 233-247
-
-
Payne, B.D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
25
-
-
77952336652
-
VMM-based hidden process detection and identification using Lycosid
-
S.T. Jones, A.C. Arpaci-Dusseau, R.H. Arpaci-Dusseau, VMM-based hidden process detection and identification using Lycosid, in: Proc. of the 4th ACM/USENIX International Conference on Virtual Execution Environments, 2008, pp. 91-100.
-
(2008)
Proc. of the 4th ACM/USENIX International Conference on Virtual Execution Environments
, pp. 91-100
-
-
Jones, S.T.1
Arpaci-Dusseau, A.C.2
Arpaci-Dusseau, R.H.3
-
26
-
-
77950853188
-
Stealthy malware detection through VMM-based out-of-The-box semantic view reconstruction
-
X. Jiang, X. Wang, D. Xu, Stealthy malware detection through VMM-based out-of-the-box semantic view reconstruction, in: Proc. of the 14th ACM Conference on Computer and Communications Security, 2007, pp. 128-138.
-
(2007)
Proc. of the 14th ACM Conference on Computer and Communications Security
, pp. 128-138
-
-
Jiang, X.1
Wang, X.2
Xu, D.3
-
27
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
A. Dinaburg, P. Royal, M. Sharif, W. Lee, Ether: malware analysis via hardware virtualization extensions, in: Proc. of the 15th ACM Conference on Computer and Communications Security, 2008, pp. 51-62.
-
(2008)
Proc. of the 15th ACM Conference on Computer and Communications Security
, pp. 51-62
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
29
-
-
76649114635
-
Toward revealing kernel malware behavior in virtual execution environments
-
C. Xuan, J. Copeland, R. Beyah, Toward revealing kernel malware behavior in virtual execution environments, in: Proc. of the 12th International Symposium on Recent Advances in Intrusion Detection, 2009, pp. 304-325.
-
(2009)
Proc. of the 12th International Symposium on Recent Advances in Intrusion Detection
, pp. 304-325
-
-
Xuan, C.1
Copeland, J.2
Beyah, R.3
-
32
-
-
84910156435
-
VTPM: Virtualizing the trusted platform module
-
S. Berger, R. Caceres, K.A. Goldman, R. Perez, R. Sailer, L.V. Doorn, vTPM: virtualizing the trusted platform module, in: Proc. of the 15th conference on USENIX Security Symposium, 2006, pp. 305-320.
-
(2006)
Proc. of the 15th Conference on USENIX Security Symposium
, pp. 305-320
-
-
Berger, S.1
Caceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Doorn, L.V.6
-
33
-
-
85065163256
-
Remus: High availability via asynchronous virtual machine replication
-
B. Cully, G. Lefebvre, D.T. Meyer, M. Feeley, N.C. Hutchinson, A. Warfield, Remus: high availability via asynchronous virtual machine replication, in: Proc. of USENIX Symposium on Networked Systems Design and Implementation, 2008, pp. 161-174.
-
(2008)
Proc. of USENIX Symposium on Networked Systems Design and Implementation
, pp. 161-174
-
-
Cully, B.1
Lefebvre, G.2
Meyer, D.T.3
Feeley, M.4
Hutchinson, N.C.5
Warfield, A.6
|