-
1
-
-
70350394544
-
-
White Paper, Last Accessed 04-12-13
-
Vmware, Inc. Virtualization Overview, White Paper. http://www.vmware.com/ pdf/virtualization.pdf. [Last Accessed 04-12-13].
-
Virtualization Overview
-
-
-
2
-
-
33744908283
-
Seamless live migration of virtual machines over the MAN/WAN
-
F. Travostinoa, P. Daspitb, L. Gommansc, C. Joga, C. de Laatc, J. Mambrettid, I. Mongaa, B. van Oudenaardec, S. Raghunatha, Ph. Yonghui Wange, Seamless live migration of virtual machines over the MAN/WAN, Future Generation Computer Systems 22. 901907. 2006.
-
(2006)
Future Generation Computer Systems 22. 901907
-
-
Travostinoa, F.1
Daspitb, P.2
Gommansc, L.3
Joga, C.4
De Laatc, C.5
Mambrettid, J.6
Mongaa, I.7
Van Oudenaardec, B.8
Raghunatha, S.9
Yonghui Wange, Ph.10
-
3
-
-
33749654837
-
Live migration of virtual machines
-
Ch. Clark Keir, C. Clark, K. Fraser, H. Steven, J. Gorm Hansen, E. Jul, C. Limpach, I. Pratt, A. Warfield, Live Migration of Virtual Machines. In Proceedings of the 2nd ACM/USENIX Symposium on Networked Systems Design and Implementation. 2005.
-
(2005)
Proceedings of the 2nd ACM/USENIX Symposium on Networked Systems Design and Implementation
-
-
Clark Keir, Ch.1
Clark, C.2
Fraser, K.3
Steven, H.4
Hansen, J.G.5
Jul, E.6
Limpach, C.7
Pratt, I.8
Warfield, A.9
-
4
-
-
77950347409
-
A view of cloud computing
-
April
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, A view of cloud computing., Communications of the ACM, 53(4):5058, April 2010.
-
(2010)
Communications of the ACM
, vol.53
, Issue.4
, pp. 5058
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
6
-
-
36949014918
-
A study of prefix hijacking and interception in the internet
-
H. Ballani. A study of prefix hijacking and interception in the internet, In Proceedings of ACM SIGCOMM, 2007.
-
(2007)
Proceedings of ACM SIGCOMM
-
-
Ballani, H.1
-
7
-
-
84888391622
-
A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks
-
Z. Saman Taghavi, J. James, T. David. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks. IEEE Communications Surveys Tutorials, Volume:15, Issue:4, 2013.
-
(2013)
IEEE Communications Surveys Tutorials
, vol.15
, Issue.4
-
-
Taghavi, Z.S.1
James, J.2
David, T.3
-
15
-
-
70849107663
-
Empirical exploitation of live migration of virtual machines
-
March 24
-
J. Oberheide, E. Cooke, F. Jahanian. Empirical Exploitation of live migration of virtual machines. Proc of Black Hat DC, March 24, 2008.
-
(2008)
Proc of Black Hat DC
-
-
Oberheide, J.1
Cooke, E.2
Jahanian, F.3
-
16
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
Springer
-
A. Back, U. Mller, and A. Stiglic. Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems. Information Hiding, volume 2137 of Lecture Notes in Computer Science, page 245-257. Springer, 2001.
-
(2001)
Information Hiding, Volume 2137 of Lecture Notes in Computer Science
, pp. 245-257
-
-
Back, A.1
Mller, U.2
Stiglic, A.3
-
17
-
-
74049152260
-
Hey, You, get off my cloud: Exploring information leakage in third-party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, You, get off my cloud: exploring information leakage in third-party compute clouds. In Proceedings of 16th ACM conference on computer and communication security, 2009, pp 199-212
-
(2009)
Proceedings of 16th ACM Conference on Computer and Communication Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
20
-
-
80051974813
-
Application-Transparent Live Migration for virtual machine on network security enhanced hypervisor
-
C. Xianqin, G. Xiaopeng, W. Han, W. Sumei, L. Xiang. Application- Transparent Live Migration for virtual machine on network security enhanced hypervisor. Research paper. China Communications. Page 32 42, 2011.
-
(2011)
Research Paper. China Communications
, pp. 32-42
-
-
Xianqin, C.1
Xiaopeng, G.2
Han, W.3
Sumei, W.4
Xiang, L.5
-
21
-
-
84904488533
-
-
Trusted Computing Group. http://www.trustedcomputinggroup.org/resources/ tpm main specification
-
-
-
-
22
-
-
84910156435
-
Virtualizing the trusted platform module
-
S. Berger, R. Caceres, K. A. Goldman, R. Perez, R. Sailer, and L. Doorn, Virtualizing the trusted platform module. in In USENIX Security, pp. 305320, 2006.
-
(2006)
USENIX Security
, pp. 305320
-
-
Berger, S.1
Caceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Doorn, L.6
-
23
-
-
84904488534
-
-
Last Accessed 05-12-13
-
Xen Project. http://www.xenproject.org/. [Last Accessed 05-12-13].
-
-
-
-
25
-
-
84904488535
-
Secured VM live migration in personal cloud
-
China
-
W. Wang, X. Wu, B. Lin, K. Miao, X. Dang, Secured VM Live Migration in Personal Cloud. In Proceedings of ICCET, China, 2010.
-
(2010)
Proceedings of ICCET
-
-
Wang, W.1
Wu, X.2
Lin, B.3
Miao, K.4
Dang, X.5
-
26
-
-
70249085218
-
Hypervisor-based system for protecting software runtime memory and persistent storage
-
Ottawa, Canada, April 14-17
-
P. Dewan, D. Durham, H. Khosravi, M. Long, and G. Nagabhushan. hypervisor-based system for protecting software runtime memory and persistent storage. In Proceedings of the 2008 Spring Simulation Multiconference (Ottawa, Canada, April 14-17, 2008).
-
(2008)
Proceedings of the 2008 Spring Simulation Multiconference
-
-
Dewan, P.1
Durham, D.2
Khosravi, H.3
Long, M.4
Nagabhushan, G.5
|