메뉴 건너뛰기




Volumn , Issue , 2017, Pages 116-123

Virtualization in Cloud Computing: Existing solutions and new approach

Author keywords

Cloud Computing; Hypervisor; Security; Virtualization

Indexed keywords

VIRTUAL REALITY; VIRTUALIZATION;

EID: 85013858869     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CloudTech.2016.7847687     Document Type: Conference Paper
Times cited : (15)

References (22)
  • 4
    • 77954969841 scopus 로고    scopus 로고
    • NoHype: Virtualized c1ud inrrastructure without the virtualization
    • ACM, June
    • E. Keller, J. Szefer, J. Rexford, R-B. Lee, "NoHype: Virtualized c1ud inrrastructure without the virtualization", ACM SIGARCH Computer Architecture News (Vol. 38, No. 3, pp. 350-361), ACM, June 2010.
    • (2010) ACM SIGARCH Computer Architecture News , vol.38 , Issue.3 , pp. 350-361
    • Keller, E.1    Szefer, J.2    Rexford, J.3    Lee, R.-B.4
  • 5
    • 84858773328 scopus 로고    scopus 로고
    • Architectural Support for Hypervisorsecure virtualization
    • ACM, March
    • J. Szefer, R-B. Lee, "Architectural Support for Hypervisorsecure virtualization", ACM SIGPLAN Notices (Vol. 47, No. 4, pp. 437-450), ACM, March 2012.
    • (2012) ACM SIGPLAN Notices , vol.47 , Issue.4 , pp. 437-450
    • Szefer, J.1    Lee, R.-B.2
  • 7
    • 85013749918 scopus 로고    scopus 로고
    • Towards a hypervisor security-based service and its research challenges
    • April
    • T. Shree, M. Kumar, N. Badal, "Towards a hypervisor security-based service and its research challenges", International Journal of Computer Applications, Vol. 115, No. 17, 38-42, April 2015.
    • (2015) International Journal of Computer Applications , vol.115 , Issue.17 , pp. 38-42
    • Shree, T.1    Kumar, M.2    Badal, N.3
  • 10
    • 78449249325 scopus 로고    scopus 로고
    • Network forensic frameworks: Survey and research challenges
    • E-S. Pilli, R-C. Joshi, R. Niyogi, "Network forensic frameworks: Survey and research challenges", Digital Investigation, Vo1. 7, No. 1/2, pp. 14-27, 2010
    • (2010) Digital Investigation , vol.7 , Issue.1-2 , pp. 14-27
    • Pilli, E.-S.1    Joshi, R.-C.2    Niyogi, R.3
  • 13
    • 80053139108 scopus 로고    scopus 로고
    • Multi-dimensional SLA-based resource allocation for multi-tier Cloud Computing systems
    • July
    • H. Goudarzi, M. Pedram, "Multi-dimensional SLA-based resource allocation for multi-tier Cloud Computing systems", Cloud Computing (CLOUD), IEEE International Conference on (pp. 324-331), July 2011.
    • (2011) Cloud Computing (CLOUD) IEEE International Conference on , pp. 324-331
    • Goudarzi, H.1    Pedram, M.2
  • 17
    • 84992182952 scopus 로고    scopus 로고
    • Intrusion detection techniques performance in Cloud environments
    • Kuala Lumpur, Malaysia
    • F. Sabahi, "Intrusion detection techniques performance in Cloud environments", Proc. Conf. on Coputer Design and Engineering, Kuala Lumpur, Malaysia, . 398-402, 2011.
    • (2011) Proc. Conf. on Coputer Design and Engineering , pp. 398-402
    • Sabahi, F.1
  • 22
    • 0010155667 scopus 로고
    • Harris Louis Associates Tech. Rep., conducted for Equifax Inc. 1, 255 adults of the U. S. public
    • A Westin and Harris Louis Associates, "Harris-equifax consumer privacy survey", Tech. Rep., conducted for Equifax Inc. 1, 255 adults of the U. S. public, 1991.
    • (1991) Harris-equifax Consumer Privacy Survey
    • Westin, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.