메뉴 건너뛰기




Volumn , Issue , 2013, Pages 243-248

A framework for secure live migration of virtual machines

Author keywords

inter VM attacks; live migration; live migration attack model; live migration security; reactive IDS; role based access control policy

Indexed keywords

ATTACK MODEL; INTER VM ATTACKS; LIVE MIGRATIONS; REACTIVE IDS; ROLE-BASED ACCESS CONTROL;

EID: 84891957576     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICACCI.2013.6637178     Document Type: Conference Paper
Times cited : (27)

References (19)
  • 4
    • 84871987653 scopus 로고    scopus 로고
    • On the use of virtualization technologies to support uninterrupted it services: A case study with lessons learned from the great east japan earthquake in proceedings of
    • Tsugawa, M., Figueiredo, R.; Fortes, J.; Hirofuchi, T.; Nakada, H.; Takano, R. "On the use of virtualization technologies to support uninterrupted IT services: A case study with lessons learned from the Great East Japan Earthquake". In proceedings of "2012 IEEE International Conference on Communications (ICC)", Ottawa, ON, 2012, pp 6324-6328.
    • (2012) 2012 IEEE International Conference on Communications (ICC) Ottawa, on , pp. 6324-6328
    • Tsugawa, M.1    Figueiredo, R.2    Fortes, J.3    Hirofuchi, T.4    Nakada, H.5    Takano, R.6
  • 6
    • 84944386303 scopus 로고    scopus 로고
    • When virtual is harder than real: Security challenges in virtual machine based computing environments
    • ACM, Berkeley, USA
    • T. Garfinkel, M. Rosenblum. "When virtual is harder than real: Security challenges in virtual machine based computing environments", In Proceedings of the 10th Conference on Hot Topics in Operating Systems, ACM, Berkeley, USA, 2005, vol.10, pp.20.
    • (2005) Proceedings of the 10th Conference on Hot Topics in Operating Systems , vol.10 , pp. 20
    • Garfinkel, T.1    Rosenblum, M.2
  • 7
    • 49949095440 scopus 로고    scopus 로고
    • Virtualization sparks security concerns
    • DOI: 10.1109/MC.2008.276
    • Steven J. Vaughan-Nichols." Virtualization Sparks Security Concerns", Published by the IEEE Computer Society, August 2008, DOI: 10.1109/MC.2008.276, volume 41, pp: 13-15.
    • (2008) Published by the IEEE Computer Society, August , vol.41 , pp. 13-15
    • Steven, V.-N.J.1
  • 12
    • 84891958228 scopus 로고    scopus 로고
    • Xen users'manual Xen v3.3(accessed on February 6, 2013).
    • Xen users'manual Xen v3.3. http://bits.xensource.com/Xen/docs/user.pdf (accessed on February 6, 2013).
  • 17
    • 84891930126 scopus 로고    scopus 로고
    • accessed on February 6, 2013
    • www.sudo.ws (accessed on February 6, 2013).
  • 18
    • 79952496582 scopus 로고    scopus 로고
    • Guidelines on firewalls and firewall policy
    • September Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930
    • Scarfone K. and Hoffman P. "Guidelines on Firewalls and Firewall Policy", Computer Security Division Information Technology. September 2009, Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930.
    • (2009) Computer Security Division Information Technology
    • Scarfone, K.1    Hoffman, P.2
  • 19
    • 33645402669 scopus 로고    scopus 로고
    • Intrusion detection with snort advanced ids techniques using snort, apache, mysql, php, and acid
    • First Edition, ISBN 0-13-140733-3
    • Rafeeq UR Reheman. "Intrusion detection with Snort Advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID", Bruce Perens' Open Source Series, First Edition, 2003. ISBN 0-13-140733-3.
    • (2003) Bruce Perens' Open Source Series
    • Reheman, R.U.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.