期刊文献+

跨虚拟机的可信检测 被引量:5

Trusted Scan Cross Virtual Machines
下载PDF
导出
摘要 随着网络计算以及"云计算"的兴起,虚拟化技术得到了更多重视与应用。在计算机技术中,安全问题一直是非常重要研究课题。运用虚拟化技术,可以发现一些新的方法来解决传统非虚拟化计算机环境下的安全问题。设计并实现了虚拟机之间的检测方法,来对目标虚拟机进行可信检测。该方法最大的优势在于其对目标虚拟机进行可信检测的同时,可以避免恶意软件对检测程序本身的攻击。 Together with the development of network computing and cloud computing, the virtualization technology grows up quickly. In the computer's world, the security problem is an important problem. Through the virtualization technology, some new methods are proposed to solve traditional security problem. This paper is going to illustrate a trusted scan cross virtual machine. This method can protect the scan program from the malicious software's attacking.
出处 《计算机科学与探索》 CSCD 2010年第2期165-169,共5页 Journal of Frontiers of Computer Science and Technology
基金 国家自然科学基金No.90612018 国家重点基础研究发展规划(973)No.2007CB310900~~
关键词 跨虚拟机 可信检测 虚拟机 cross virtual machine trusted scan virtual machine
  • 相关文献

参考文献13

  • 1Goldberg R P. Architectural principles for virtual computer systems[D]. Harvard University, 1972.
  • 2Buzen J P, Gagliardi U O. The evolution of virtual machine arehiteeture[C]//Proceedings of the National Computer Conference and Exposition (AFIPS' 73), June 4-8, 1973. New York, NY, USA: ACM Press, 1973:291-299.
  • 3Attanasio C R. Virtual machines and data security[C]//Proeeedings of the Workshop on Virtual Computer Systems. New York, NY, USA: ACM Press, 1973:206-209.
  • 4Casarosa V, Paoil C. Vhm: A virtual hardware monitor[C]//Proceedings of the Workshop on Virtual Computer Systems. New York, NY, USA: ACM Press, 1973:150-169.
  • 5Goldberg R P. Architecture of virtual machines [C]//Proceedings of the National Computer Conference and Exposition (AFIPS'73), June 4-8, 1973. New York, NY, USA: ACM Press, 1973 : 309-318.
  • 6Smith J E, Nair R. The architecture of virtual machines [J]. Computer, 2005,38(5) : 32-38.
  • 7Rosenblum M, Garfinkel T. Virtual machine monitors: Current technology and future trends[J]. Computer, 2005,38 (5) : 39-47.
  • 8Rose R. Survey of system virtualization techniques[C]//Proc of the 3rd Int'l Conf on Parallel Processing and Applied Mathematics, 2004.
  • 9Arnold M, Fink S J, Grove D, et al. A survey of adaptive optimization in virtual machines[CJ//Proceedings of the IEEE, 2005,93 : 449-466.
  • 10Barham P, Dragovic B, Fraser K, et al. Xen and the art of virtualization[C]//Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP' 03). New York, NY, USA: ACM Press, 2003:164-177.

同被引文献13

引证文献5

二级引证文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部