메뉴 건너뛰기




Volumn 66, Issue 3, 2013, Pages 1133-1151

A VMM-based intrusion prevention system in cloud computing environment

Author keywords

Cloud computing; File integrity; Grid computing; Intrusion prevention; Virtualization

Indexed keywords

FINITE AUTOMATA; GRID COMPUTING; NETWORK SECURITY; VIRTUAL MACHINE; VIRTUALIZATION;

EID: 84887991186     PISSN: 09208542     EISSN: 15730484     Source Type: Journal    
DOI: 10.1007/s11227-011-0608-2     Document Type: Article
Times cited : (46)

References (29)
  • 1
    • 0035455653 scopus 로고    scopus 로고
    • The anatomy of the grid: Enabling scalable virtual organizations
    • 10.1177/109434200101500302
    • Foster I, Kesselman C, Tuecke S (2001) The anatomy of the grid: enabling scalable virtual organizations. Int J High Perform Comput Appl 15:200-222
    • (2001) Int J High Perform Comput Appl , vol.15 , pp. 200-222
    • Foster, I.1    Kesselman, C.2    Tuecke, S.3
  • 4
    • 20344383743 scopus 로고    scopus 로고
    • Virtual machine monitors: Current technology and future trends
    • 10.1109/MC.2005.176
    • Rosenblum M, Garfinkel T (2005) Virtual machine monitors: current technology and future trends. IEEE Comput 38:39-47
    • (2005) IEEE Comput , vol.38 , pp. 39-47
    • Rosenblum, M.1    Garfinkel, T.2
  • 5
    • 20344389520 scopus 로고    scopus 로고
    • The architecture of virtual machines
    • 10.1109/MC.2005.173
    • Smith JE, Nair R (2005) The architecture of virtual machines. IEEE Comput 38:32-38
    • (2005) IEEE Comput , vol.38 , pp. 32-38
    • Smith, J.E.1    Nair, R.2
  • 7
    • 84944386303 scopus 로고    scopus 로고
    • When virtual is harder than real: Security challenges in virtual machine based computing environments
    • IEEE Santa Fe
    • Garfinkel T, Rosenblum M (2005) When virtual is harder than real: security challenges in virtual machine based computing environments. In: 10th workshop on hot topics in operating systems. IEEE, Santa Fe, pp 20-25
    • (2005) 10th Workshop on Hot Topics in Operating Systems , pp. 20-25
    • Garfinkel, T.1    Rosenblum, M.2
  • 10
    • 56449101271 scopus 로고    scopus 로고
    • Finding corrupted computers using imperfect intrusion prevention system event data
    • 5219 10.1007/978-3-540-87698-4-20
    • Chrun D, Cukier M, Sneeringer G (2008) Finding corrupted computers using imperfect intrusion prevention system event data. In: Computer safety reliability, and security, vol 5219, pp 221-234
    • (2008) Computer Safety Reliability, and Security , pp. 221-234
    • Chrun, D.1    Cukier, M.2    Sneeringer, G.3
  • 15
    • 0035054933 scopus 로고    scopus 로고
    • Microprocessors for the new millennium: Challenges, opportunities, and new frontiers
    • ACM San Francisco
    • Gelsinger PP (2001) Microprocessors for the new millennium: challenges, opportunities, and new frontiers. In: 45th international solid state circuits conference. ACM, San Francisco, pp 22-35
    • (2001) 45th International Solid State Circuits Conference , pp. 22-35
    • Gelsinger, P.P.1
  • 19
    • 85080362568 scopus 로고    scopus 로고
    • A virtual machine introspection based architecture for intrusion detection
    • IEEE San Diego
    • Garfinkel T, Rosenblum M (2003) A virtual machine introspection based architecture for intrusion detection. In: 10th network and distributed system symposium. IEEE, San Diego, pp 191-206
    • (2003) 10th Network and Distributed System Symposium , pp. 191-206
    • Garfinkel, T.1    Rosenblum, M.2
  • 21
    • 32044466453 scopus 로고    scopus 로고
    • HyperSpector: Virtual distributed monitoring environments for secure intrusion detection
    • ACM Chicago 10.1145/1064979.1065006
    • Kourai K, Chiba S (2005) HyperSpector: virtual distributed monitoring environments for secure intrusion detection. In: 1st ACM/USENIX international conference on virtual execution environments. ACM, Chicago, pp 197-207
    • (2005) 1st ACM/USENIX International Conference on Virtual Execution Environments , pp. 197-207
    • Kourai, K.1    Chiba, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.