5Bort J. Server Virtualization: Controlling Server Spraul [J ]. IEEE Communications Magazine, 2003.41(2):126-133.
6张佳.虚拟集群环境下多虚拟机协同检查点容错系统[D].武汉:华中科技大学,2010.
7MURRAY D,MLOS G.HAND S.Improving XEN security through disaggregation [C ]. Proceedings of the 4th ACM SIG- PLAN/slGoPS International Conference On Virtual Execution Environments.New YOrk, MY:ACM press,2008:151 - 160.
8Laksbm J,Nandy K.I/O virmalization architecture for security [C].2010 10th 1EEE International Conference on Computer and hffortmtion Technology,2010:2267-2272.
9Secunia vulnerability report[ OL ]. [ 2012-04-13 ].http://se- cunia.Com/advisories/product.2012/.
10NIST.Guide to Seeurity for Full Virtualization Technologies [EB/OL]. (2011-1) [2012-8-21 ] . http://csrc.nist.gov/publica- tions/nistpubs/80-125/SP800-125-final.pdf.