1Ranjit Bose,Xin Luo. Integrative framework for assessing firms' potential to undertake Green IT initiatives via virtualization-A theoretical perspective [J]. The Journal of Strategic Information Systems, 2011 ( 1 ) : 38-54.
6Krishna Kant. Data center evolution:A tutorial on state of the art,issues ,and challenges Original Research Article [J]. Computer Networks,2009(17) :2939-2965.
5Bort J. Server Virtualization: Controlling Server Spraul [J ]. IEEE Communications Magazine, 2003.41(2):126-133.
6张佳.虚拟集群环境下多虚拟机协同检查点容错系统[D].武汉:华中科技大学,2010.
7MURRAY D,MLOS G.HAND S.Improving XEN security through disaggregation [C ]. Proceedings of the 4th ACM SIG- PLAN/slGoPS International Conference On Virtual Execution Environments.New YOrk, MY:ACM press,2008:151 - 160.
8Laksbm J,Nandy K.I/O virmalization architecture for security [C].2010 10th 1EEE International Conference on Computer and hffortmtion Technology,2010:2267-2272.
9Secunia vulnerability report[ OL ]. [ 2012-04-13 ].http://se- cunia.Com/advisories/product.2012/.
10NIST.Guide to Seeurity for Full Virtualization Technologies [EB/OL]. (2011-1) [2012-8-21 ] . http://csrc.nist.gov/publica- tions/nistpubs/80-125/SP800-125-final.pdf.