期刊文献+

桌面虚拟化技术在实验室建设中的应用研究——以广东松山职业技术学院为例 被引量:2

下载PDF
导出
摘要 以桌面虚拟化为切入点,以广东松山职业技术学院为蓝本,通过实际案例和数据来说明桌面虚拟化技术在实验室建设中的实际应用和该技术的优劣以及要注意的问题。阐述该技术在实验室的使用和管理中的优劣,为实际的实验室建设和管理提供一些指导建议和意见。 Based on desktop virtualization as the breakthrough point,to the hospital,through actual cases and data to illustrate the desktop virtualization technology in the practical application of the laboratory construction and the advantages and disadvantages of this technology,and pay attention to the problem.This paper expounds the technology advantages and disadvantages in the use and management of laboratory,for practical laboratory construction and management to provide some guidance Suggestions and comments.
作者 熊俊
出处 《工业控制计算机》 2016年第2期120-121,123,共3页 Industrial Control Computer
关键词 桌面虚拟化技术 PC VDI desktop virtualization,PC,VDI
  • 相关文献

参考文献8

二级参考文献42

  • 1新一代的桌面虚拟化技术[EB/OL].[2010-10-28].http://www.topoint.com.cn/html/article/2009/12/266155.html.
  • 2李悦.桌面管理系统在电力企业信息网络中的应用.教育前沿与探索,2009,(6):16-17.
  • 3桌面虚拟,春暖花开[EB/OL].[2010-10-22].http://www.edu.cn/html/info/x/xnh.shtml.
  • 4Artem Dinaburg, Paul Royal, Monirul Sharif, et al. Ether: malware analysis via hardware virtualization extensions [C]. CCS '08 , 2008.
  • 5Hai D Nguyen, Anh M Nguyen, Nabil Schear, et al. MA VMM: lightweight and purpose built VMM for malware analysis [C]. Annual Computer Security Applications Conference, 2009.
  • 6Jones S T, Arpaci Dusseau A C, Arpaci Dusseau R H, et al.VMM-based hidden process detection and identification using Lycosid [C]. VEE'08, 2008.
  • 7Zhao Lin, Kartik Gopalan, Ping Yang. A case for secure virtual append-only storage for virtual machines [C]. 39th International Conference on Parallel Processing Workshops, 2010.
  • 8Arvind Seshadri, Mark Luk, Ning Qu, et al. Sec Visor: a tiny hypervisor to provide lifetime kernel code integrity for commodity oses [C]. SOSP'07,2007.
  • 9Lin Tan, Ellick MChan, Reza Farivar, et al. iKernel: isolating buggy and malicious device drivers using hardware virtualization support [C]. Third IEEE International Symposium on Dependable, Autonomic and Secure Computing, 2007.
  • 10Jiang Meng-long, Qi Zheng-wei, Guan Hai-bing, et al. Croth , effective process protection and monitoring with hardware virtualization [CJ. IEEE,2009.

共引文献100

同被引文献14

引证文献2

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部