-
2
-
-
85059766484
-
Live migration of virtual machines
-
C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A. Warfield. Live Migration of Virtual Machines. In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI’05), 2005.
-
(2005)
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI’05)
-
-
Clark, C.1
Fraser, K.2
Hand, S.3
Hansen, J.G.4
Jul, E.5
Limpach, C.6
Pratt, I.7
Warfield, A.8
-
4
-
-
21644433634
-
Xen and the art of virtualization
-
October
-
B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, I. Pratt, A. Warfield, P. Barham, and R. Neugebauer. Xen and the Art of Virtualization. In Proceedings of the ACM Symposium on Operating Systems Principles, October 2003.
-
(2003)
Proceedings of the ACM Symposium on Operating Systems Principles
-
-
Dragovic, B.1
Fraser, K.2
Hand, S.3
Harris, T.4
Ho, A.5
Pratt, I.6
Warfield, A.7
Barham, P.8
Neugebauer, R.9
-
5
-
-
20344383517
-
Resource virtualization renaissance
-
R. Figueiredo, P. A. Dinda, and J. Fortes. Resource virtualization renaissance. IEEE Computer, 38(5):28–31, 2005.
-
(2005)
IEEE Computer
, vol.38
, Issue.5
, pp. 28-31
-
-
Figueiredo, R.1
Dinda, P.A.2
Fortes, J.3
-
6
-
-
35948950577
-
Safe hardware access with the xen virtual machine monitor
-
K. Fraser, S. Hand, R. Neugebauer, I. Pratt, A. Warfield, and M. Williamson. Safe Hardware Access with the Xen Virtual Machine Monitor. In Proceedings of the OASIS ASPLOS Workshop, 2004.
-
(2004)
Proceedings of the OASIS ASPLOS Workshop
-
-
Fraser, K.1
Hand, S.2
Neugebauer, R.3
Pratt, I.4
Warfield, A.5
Williamson, M.6
-
7
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, and Dan Boneh. Terra: a Virtual Machine-based Platform for Trusted Computing. In Proceedings of the Symposium on Operating Systems Principles (SOSP), pages 193–206, 2003.
-
(2003)
Proceedings of the Symposium on Operating Systems Principles (SOSP)
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
8
-
-
84926427148
-
Survey of virtual machine research
-
R. P. Goldberg. Survey of Virtual Machine Research. IEEE Computer Magazine, 7(6):34–45, 1974.
-
(1974)
IEEE Computer Magazine
, vol.7
, Issue.6
, pp. 34-45
-
-
Goldberg, R.P.1
-
9
-
-
85077694110
-
-
Applied Data Security Group. What is TrustedGRUB, http://www.prosec.ruhr-uni-bochum.de/trusted_grub.html.
-
What Is TrustedGRUB
-
-
-
12
-
-
85077723299
-
-
IBM. IBM eServer x366. http://www03.ibm.com/servers/eserver/xseries/x366.html.
-
IBM eServer X366
-
-
-
15
-
-
33646937049
-
-
IBM. Secure Coprocessing. http://www.research.ibm.com/secure_systems_department/projects/scop/index.html.
-
Secure Coprocessing
-
-
-
16
-
-
84866790854
-
-
IBM. Trusted Virtual Data Center. http://domino.research.ibm.com/comm/research_projects.nsf/pages/ssd_trustedvirtualdatacenter.index.html.
-
Trusted Virtual Data Center
-
-
-
17
-
-
84941192747
-
Secure data management in trusted computing
-
U. Kühn, K. Kursawe, S. Lucks, A. Sadeghi, and C. Stüble. Secure data management in trusted computing. In Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2005), 2005.
-
(2005)
Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2005)
-
-
Kühn, U.1
Kursawe, K.2
Lucks, S.3
Sadeghi, A.4
Stüble, C.5
-
18
-
-
33748087527
-
-
Technical Report RT0564, IBM, February
-
H. Maruyama, F. Seliger, N. Nagaratnam, T. Ebringer, S. Munetoh, S. Yoshihama, and T. Nakamura. Trusted platform on demand. Technical Report RT0564, IBM, February 2004.
-
(2004)
Trusted Platform on Demand
-
-
Maruyama, H.1
Seliger, F.2
Nagaratnam, N.3
Ebringer, T.4
Munetoh, S.5
Yoshihama, S.6
Nakamura, T.7
-
19
-
-
0003629990
-
-
National Institute of Standards and Technology. Federal Information Processing Standards Publication 180-1
-
National Institute of Standards and Technology. Secure Hash Standard (SHA-1). Federal Information Processing Standards Publication 180-1, 1993.
-
(1993)
Secure Hash Standard (SHA-1)
-
-
-
20
-
-
33750248123
-
Building a MAC-based security architecture for the xen opensource hypervisor
-
December
-
R. Sailer, T. Jaeger, E. Valdez, R. Cáceres, R. Perez, S. Berger, J. Griffin, and L. van Doorn. Building a MAC-based security architecture for the Xen opensource hypervisor. In Proceedings of the Annual Computer Security Applications Conference (AC-SAC), December 2005.
-
(2005)
Proceedings of the Annual Computer Security Applications Conference (AC-SAC)
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Cáceres, R.4
Perez, R.5
Berger, S.6
Griffin, J.7
van Doorn, L.8
-
23
-
-
85077704910
-
-
Trusted Computing Group. http://www.trustedcomputinggroup.org.
-
-
-
-
26
-
-
85077722345
-
-
VMware, Inc. http://www.vmware.com.
-
-
-
|