2Jasti A,Shah P,Nagaraj R,et al.Security in multi-tenancycloud.Proceedings of 2010 IEEE International CarnahanConference on Security Technology(ICCST),San Jose,CA,2010:35~41.
3Hanqian Wu,Yi Ding,Winer Chuck,et al.Network securityfor virtual machine in cloud computing.Proceedings of 5thInternational Conference on Computer,Sciences andConvergence Information Technology(ICCIT),Seoul,Korea,2010:18~21.
5Yanfeng Zhang,Cuirong Wang,Yuan Gao.A QoS-oriented network architecture based on virtualization.Proceedings of First International Workshop on Education Technology and Computer Science,Wuhan,China,2009:959~963.
6Sehgal N K,Ganguli M.Applications of virtualization for server management and security.Proceedings of IEEE International Conference on Industrial Technology(ICIT),Mumbai,India,2006:2 752~2 755.
7Xiaorui Wang,Yefu Wang.Coordinating power control and performance management for virtualized server clusters.IEEE Transactions on Parallel and Distributed Systems,2011,22(2):245~259.
10Chen P M,Noble B D.When virtual is better than real.Proceedings of the 8th Workshop on HotTopics in Operating Systems,IEEE Computer Society,Washington,DC,USA,2001.