期刊文献+

服务器虚拟化技术及安全性探讨 被引量:1

下载PDF
导出
摘要 本文主要对当前服务器虚拟化技术中的全虚拟化、半虚拟化、硬件辅助虚拟化的相关原理进行分析,并以此为依据探讨服务器虚拟化技术应用中存在的安全风险以及应对措施进行探析。
作者 彭锦
出处 《通讯世界》 2015年第5期193-193,共1页 Telecom World
  • 相关文献

参考文献1

二级参考文献14

  • 1王庆波,金漳,何乐,等.虚拟化与云计算[M].北京:电子工业出版社,2010.
  • 2Rich uhlig, Gil Neiger, Dion Rodgers. Intel virtualization technology [J]. IEEE Computer. 2005, 38(5):48-56.
  • 3Smith J, Nair R. The architecture of virtual machines [J]. Computer. 2005, 38(5):32-38.
  • 4Ronald Perez, Reiner Sailer, Leendert Van Doom. Virtualization and hardware-based security [J]. IEEE Security & Privacy. 2008, 6(5):24-31.
  • 5Rosenblum M, Garfinkel T. Viztual machine monitors: current technology and future trends [J]. IEEE Computer Magazine, 2005, 38(5):39-47.
  • 6MURRAY D, MLOS G. HAND S. Improving XEN security through disaggregation [C]. Proceedings of the 4th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments. New York, NY: ACM press, 2008: 151-160.
  • 7Lakshmi J, Nandy S K. I/O virtualization architecture for security [C]. 2010 10th IEEE International Conference on Computer and Information Technology (CIT). 2010:2267-2272.
  • 8Mohammad Reza Ahmadi, Davood Maleki. Performance evaluation of server virtualization in data center applications [C]. 2010 5th International Symposium on Telecommunications. 2010:638-644.
  • 9Ribiere A. Emulation of obsolete hardware in open source virtualization software [C]. 2010 8th IEEE International Conference on Industrial Informatics. 2010:354-360.
  • 10Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anup K. Ghosh. A virtualization architecture for in-depth kernel isolation [C]. Proceedings of the 43rd Hawaii International Conference on System Sciences. 2010:1-10.

共引文献32

同被引文献2

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部