-
1
-
-
84863160008
-
Evaluation of server virtualization technologies for green IT
-
Irvine, CA
-
Lu Liu, Masfary, O.; Jianxin Li. "Evaluation of server virtualization technologies for green IT". In proceedings of "Service Oriented System Engineering (SOSE), 2011 IEEE 6th International Symposium", 2011,Irvine, CA, pp 79-84.
-
(2011)
Proceedings of Service Oriented System Engineering (SOSE), 2011 IEEE 6th International Symposium
, pp. 79-84
-
-
Liu, L.1
Masfary, O.2
Jianxin, Li.3
-
3
-
-
85059766484
-
Live migration of virtual machines
-
C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A. Warfield. "Live migration of virtual machines". In Proceedings of NSDI'05, Berkeley, CA, USA. USENIX Association, 2005, pp 273-286.
-
(2005)
Proceedings of NSDI'05, Berkeley, CA, USA. USENIX Association
, pp. 273-286
-
-
Clark, C.1
Fraser, K.2
Hand, S.3
Hansen, J.G.4
Jul, E.5
Limpach, C.6
Pratt, I.7
Warfield, A.8
-
4
-
-
84871987653
-
On the use of virtualization technologies to support uninterrupted it services: A case study with lessons learned from the great east japan earthquake in proceedings of
-
Tsugawa, M., Figueiredo, R.; Fortes, J.; Hirofuchi, T.; Nakada, H.; Takano, R. "On the use of virtualization technologies to support uninterrupted IT services: A case study with lessons learned from the Great East Japan Earthquake". In proceedings of "2012 IEEE International Conference on Communications (ICC)", Ottawa, ON, 2012, pp 6324-6328.
-
(2012)
2012 IEEE International Conference on Communications (ICC) Ottawa, on
, pp. 6324-6328
-
-
Tsugawa, M.1
Figueiredo, R.2
Fortes, J.3
Hirofuchi, T.4
Nakada, H.5
Takano, R.6
-
5
-
-
80052251157
-
Security in virtual machine live migration for kvm
-
Coimbatore
-
YamunaDevi, L. Aruna, P.; Sudha, D.D.; Priya, N." Security in Virtual Machine Live Migration for KVM". In proceedings of "2011 International Conference on Process Automation, Control and Computing (PACC)", Coimbatore, 2011, pp 1-6.
-
(2011)
Proceedings of 2011 International Conference on Process Automation, Control and Computing (PACC
, pp. 1-6
-
-
Devi, Y.1
Aruna, L.2
Sudha, P.3
Sudha, D.D.4
Priya, N.5
-
6
-
-
84944386303
-
When virtual is harder than real: Security challenges in virtual machine based computing environments
-
ACM, Berkeley, USA
-
T. Garfinkel, M. Rosenblum. "When virtual is harder than real: Security challenges in virtual machine based computing environments", In Proceedings of the 10th Conference on Hot Topics in Operating Systems, ACM, Berkeley, USA, 2005, vol.10, pp.20.
-
(2005)
Proceedings of the 10th Conference on Hot Topics in Operating Systems
, vol.10
, pp. 20
-
-
Garfinkel, T.1
Rosenblum, M.2
-
7
-
-
49949095440
-
Virtualization sparks security concerns
-
DOI: 10.1109/MC.2008.276
-
Steven J. Vaughan-Nichols." Virtualization Sparks Security Concerns", Published by the IEEE Computer Society, August 2008, DOI: 10.1109/MC.2008.276, volume 41, pp: 13-15.
-
(2008)
Published by the IEEE Computer Society, August
, vol.41
, pp. 13-15
-
-
Steven, V.-N.J.1
-
8
-
-
77954336067
-
Virtualization: A survey on concepts, taxonomy and associated security issues
-
DOI: 10.1109/ICCNT.2010.49
-
Jyotiprakash Sahoo, Subasish Mohapatra, Radha Lath," Virtualization: A Survey On Concepts, Taxonomy And Associated Security Issues", In proceedings of Second International Conference on Computer and Network Technology, 2010,DOI: 10.1109/ICCNT.2010.49, pp:222-226.
-
(2010)
Proceedings of Second International Conference on Computer and Network Technology
, pp. 222-226
-
-
Sahoo, J.1
Mohapatra, S.2
Lath, R.3
-
9
-
-
70849097492
-
Security implications of virtualization: A literature study
-
Baton Rouge, Louisiana, USA, DOI 10.1109/CSE.267
-
Andre van Cleeff, Wolter Pieters, Roel Wieringa, "Security Implications of Virtualization: A Literature Study", International Conference on Computational Science and Engineering, 2009, Baton Rouge, Louisiana, USA, DOI 10.1109/CSE.2009.267, pp: 353-358.
-
(2009)
International Conference on Computational Science and Engineering, 2009
, pp. 353-358
-
-
Van Cleeff, A.1
Pieters, W.2
Wieringa, R.3
-
11
-
-
84874225638
-
Dynamic load balancing based on live migration of virtual machines: Security threats and effects
-
Rochester, NY, U.S.A
-
Melvin Ver. "Dynamic Load Balancing Based On Live Migration Of Virtual Machines: Security Threats and Effects", January 2011,Thesis report Rochester Institute of Technology, B. Thomas Golisano College of Computing and Information Sciences (GCCIS), Rochester, NY, U.S.A.
-
January 2011, Thesis Report Rochester Institute of Technology, B. Thomas Golisano College of Computing and Information Sciences (GCCIS
-
-
Ver, M.1
-
12
-
-
84891958228
-
-
Xen users'manual Xen v3.3(accessed on February 6, 2013).
-
Xen users'manual Xen v3.3. http://bits.xensource.com/Xen/docs/user.pdf (accessed on February 6, 2013).
-
-
-
-
13
-
-
74049152260
-
Hey, You, get off my cloud: Exploring information leakage in third-party compute clouds
-
Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. "Hey, You, get off my cloud: exploring information leakage in third-party compute clouds". In Proceedings of 16th ACM conference on computer and communication security, 2009, pp 199-212.
-
(2009)
Proceedings of 16th ACM Conference on Computer and Communication Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
15
-
-
77958069314
-
Secured and reliable vm live migration in personal cloud
-
Chengdu, China
-
Wei Wang†, Xiaoxin Wu, Ben Lin, Kai Miao, Xiaoyan Dang,"Secured and reliable VM Live Migration in Personal Cloud", In Proceedings of international conference computer engineering and technology (ICCET), Chengdu, China 2010. pp 705-709.
-
(2010)
Proceedings of International Conference Computer Engineering and Technology (ICCET
, pp. 705-709
-
-
Wang, W.1
Wu, X.2
Lin, B.3
Miao, K.4
Dang, X.5
-
16
-
-
84855701474
-
Enabling secure vm-vtpm migration in private clouds
-
Oriando, Florida
-
Boris Dandev, Ramya Jayram Masti, Ghassan Karame, Srdjan Capkun "Enabling Secure VM-vTPM Migration in private clouds" In Proceedings of the Annual computer Security Applications conference (ACSAC), Oriando, Florida, 2011, pp 187-196.
-
(2011)
Proceedings of the Annual Computer Security Applications Conference (ACSAC
, pp. 187-196
-
-
Dandev, B.1
Masti, R.J.2
Karame, G.3
Capkun, S.4
-
17
-
-
84891930126
-
-
accessed on February 6, 2013
-
www.sudo.ws (accessed on February 6, 2013).
-
-
-
-
18
-
-
79952496582
-
Guidelines on firewalls and firewall policy
-
September Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930
-
Scarfone K. and Hoffman P. "Guidelines on Firewalls and Firewall Policy", Computer Security Division Information Technology. September 2009, Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930.
-
(2009)
Computer Security Division Information Technology
-
-
Scarfone, K.1
Hoffman, P.2
-
19
-
-
33645402669
-
Intrusion detection with snort advanced ids techniques using snort, apache, mysql, php, and acid
-
First Edition, ISBN 0-13-140733-3
-
Rafeeq UR Reheman. "Intrusion detection with Snort Advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID", Bruce Perens' Open Source Series, First Edition, 2003. ISBN 0-13-140733-3.
-
(2003)
Bruce Perens' Open Source Series
-
-
Reheman, R.U.R.1
|