2Goldberg R P. Architectural Principles for Virtual Computer Systems [ D]. Cambridge:Harvard University, 1972 : 1-5.
3Adams K, Agesen O. A comparison of software and hardware techniques for X86 virtualization[ C]// Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems. New York.. ACM, 2006:2-13.
4Huang Y, Stavrou A, Ghosh A K, et al. Efficiently tracking application interactions using lightweight virtualization[C]// Proceedings of the 1st ACM Workshop on Virtual Machine Security. New York.. ACM, 2008 : 19-28.
6Barham P, Dragovic B, Fraser K, et al. Xen and the art of virtualization[C]//Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles. New York: ACM, 2003:164-177.
7Pratt. Xen 3. 0 and the art of virtualization[C]// Proceedings of the Ottawa Linux Symposium. Ottawa: 2005 Linux Symposium, 2005:65-78.
8Garfinkel T, Pfaff B, Chow J, et al. A virtual machine-based platform for trusted eomputing [C]// Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles. New York: ACM, 2003 : 193-206.
9OpenTC. [2005-11-15]. http://www, opente, net.
10Garfinkel T, Rosenblum M. A virtual machine introspection based architecture for intrusion detection [C] //Proceedings of the Internet Society's 10th Symposium on Network and Distributed System Security. San Diego: ISOC, 2003:1-16.