期刊文献+

服务器虚拟化技术及安全研究 被引量:33

Research on Technology and Security of Server Virtualization
下载PDF
导出
摘要 文章概述了x86平台服务器主流虚拟化技术分类及原理,比较分析了全虚拟化、半虚拟化和硬件辅助虚拟化技术的优势和缺点,同时分析了服务器虚拟化带来的新的安全风险与挑战,并讨论了在虚拟环境下的安全应对措施。 This paper gives an insight to the technological development of the virtual machine, briefly presents the different categories and principles of server virtualization technologies for x86 architecture, and deeply analyzes the advantages and shortcomings of full virtualization, para-virtualization and hardware-assisted virtualization. Meanwhile, some new security risk and challenges that accompanied with the application of server virtualization have been analyzed and discussed in the paper. In order to solve the above problems, this paper puts forward some corresponding measures to secure the virtual environment.
出处 《信息网络安全》 2011年第9期35-37,共3页 Netinfo Security
基金 2010年电子信息产业发展基金项目资助(课题名称:联想网御高性能IPv6防火墙研发与产业化)
关键词 服务器虚拟化 虚拟机 风险分析 安全措施 server virtualization virtual machine risk analysis security measures
  • 相关文献

参考文献14

  • 1Rich uhlig, Gil Neiger, Dion Rodgers. Intel virtualization technology [J]. IEEE Computer. 2005, 38(5):48-56.
  • 2Smith J, Nair R. The architecture of virtual machines [J]. Computer. 2005, 38(5):32-38.
  • 3Ronald Perez, Reiner Sailer, Leendert Van Doom. Virtualization and hardware-based security [J]. IEEE Security & Privacy. 2008, 6(5):24-31.
  • 4Rosenblum M, Garfinkel T. Viztual machine monitors: current technology and future trends [J]. IEEE Computer Magazine, 2005, 38(5):39-47.
  • 5MURRAY D, MLOS G. HAND S. Improving XEN security through disaggregation [C]. Proceedings of the 4th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments. New York, NY: ACM press, 2008: 151-160.
  • 6张志国.服务器虚拟化安全风险及其对策研究[J].晋中学院学报,2010,27(3):83-85. 被引量:27
  • 7Lakshmi J, Nandy S K. I/O virtualization architecture for security [C]. 2010 10th IEEE International Conference on Computer and Information Technology (CIT). 2010:2267-2272.
  • 8Mohammad Reza Ahmadi, Davood Maleki. Performance evaluation of server virtualization in data center applications [C]. 2010 5th International Symposium on Telecommunications. 2010:638-644.
  • 9王庆波,金漳,何乐,等.虚拟化与云计算[M].北京:电子工业出版社,2010.
  • 10Ribiere A. Emulation of obsolete hardware in open source virtualization software [C]. 2010 8th IEEE International Conference on Industrial Informatics. 2010:354-360.

二级参考文献3

  • 1计算机世界报.虚拟化改变网络结构[N].计算机世界,2008-10-20(47).
  • 2东缘.实施虚拟化如何避免服务器过载[EB/OL].[2009-10-19/2009-12-14].http://server.ctocio.com.cn/serve_vm/169/9237669.shtml.
  • 3冉金龙.如何打造最安全的服务器虚拟化环境[EB/OL].[2008-11-12/2009-12-11].http://www.enet.com.cn/ediy/inforcenter/enet_z.jsp?articleid=20081112388289.

共引文献64

同被引文献158

引证文献33

二级引证文献66

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部