메뉴 건너뛰기




Volumn , Issue , 2014, Pages 160-165

Secure live virtual machines migration: Issues and solutions

Author keywords

[No Author keywords available]

Indexed keywords

VIRTUAL REALITY;

EID: 84904489078     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WAINA.2014.35     Document Type: Conference Paper
Times cited : (43)

References (26)
  • 1
    • 70350394544 scopus 로고    scopus 로고
    • White Paper, Last Accessed 04-12-13
    • Vmware, Inc. Virtualization Overview, White Paper. http://www.vmware.com/ pdf/virtualization.pdf. [Last Accessed 04-12-13].
    • Virtualization Overview
  • 6
    • 36949014918 scopus 로고    scopus 로고
    • A study of prefix hijacking and interception in the internet
    • H. Ballani. A study of prefix hijacking and interception in the internet, In Proceedings of ACM SIGCOMM, 2007.
    • (2007) Proceedings of ACM SIGCOMM
    • Ballani, H.1
  • 7
    • 84888391622 scopus 로고    scopus 로고
    • A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks
    • Z. Saman Taghavi, J. James, T. David. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks. IEEE Communications Surveys Tutorials, Volume:15, Issue:4, 2013.
    • (2013) IEEE Communications Surveys Tutorials , vol.15 , Issue.4
    • Taghavi, Z.S.1    James, J.2    David, T.3
  • 15
    • 70849107663 scopus 로고    scopus 로고
    • Empirical exploitation of live migration of virtual machines
    • March 24
    • J. Oberheide, E. Cooke, F. Jahanian. Empirical Exploitation of live migration of virtual machines. Proc of Black Hat DC, March 24, 2008.
    • (2008) Proc of Black Hat DC
    • Oberheide, J.1    Cooke, E.2    Jahanian, F.3
  • 20
    • 80051974813 scopus 로고    scopus 로고
    • Application-Transparent Live Migration for virtual machine on network security enhanced hypervisor
    • C. Xianqin, G. Xiaopeng, W. Han, W. Sumei, L. Xiang. Application- Transparent Live Migration for virtual machine on network security enhanced hypervisor. Research paper. China Communications. Page 32 42, 2011.
    • (2011) Research Paper. China Communications , pp. 32-42
    • Xianqin, C.1    Xiaopeng, G.2    Han, W.3    Sumei, W.4    Xiang, L.5
  • 21
    • 84904488533 scopus 로고    scopus 로고
    • Trusted Computing Group. http://www.trustedcomputinggroup.org/resources/ tpm main specification
  • 23
    • 84904488534 scopus 로고    scopus 로고
    • Last Accessed 05-12-13
    • Xen Project. http://www.xenproject.org/. [Last Accessed 05-12-13].


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.