期刊文献+

虚拟化安全防护关键技术研究 被引量:7

下载PDF
导出
摘要 虚拟化是云计算的基础技术之一,资源共享带来的安全问题始终是虚拟化环境安全的核心问题。在分析虚拟化面临的安全风险与挑战问题的基础上,深入研究了虚拟化安全防护关键技术,并提出了一种虚拟化环境下的软件定义安全服务框架,其具有良好的开放性和可扩展性。
出处 《电信科学》 北大核心 2014年第S2期107-110,共4页 Telecommunications Science
  • 相关文献

参考文献3

二级参考文献21

  • 1Cloud Security Alliance. Security guidance for gritical areas of focus in cloud computing, http://www.cloudsecurityalliance.org/ csaguide.pdf.
  • 2王鹏,黄华峰,曹珂.云计算:中国未来的IT战略.北京:人民邮电出版社,2010.
  • 3Jasti A,Shah P,Nagaraj R,et al.Security in multi-tenancycloud.Proceedings of 2010 IEEE International CarnahanConference on Security Technology(ICCST),San Jose,CA,2010:35~41.
  • 4Hanqian Wu,Yi Ding,Winer Chuck,et al.Network securityfor virtual machine in cloud computing.Proceedings of 5thInternational Conference on Computer,Sciences andConvergence Information Technology(ICCIT),Seoul,Korea,2010:18~21.
  • 5Tim Mather,Subra Kumaraswamy,Shahed Latif.Cloud Securityand Privacy.O'Reilly Media,2009.
  • 6Yanfeng Zhang,Cuirong Wang,Yuan Gao.A QoS-oriented network architecture based on virtualization.Proceedings of First International Workshop on Education Technology and Computer Science,Wuhan,China,2009:959~963.
  • 7Sehgal N K,Ganguli M.Applications of virtualization for server management and security.Proceedings of IEEE International Conference on Industrial Technology(ICIT),Mumbai,India,2006:2 752~2 755.
  • 8Xiaorui Wang,Yefu Wang.Coordinating power control and performance management for virtualized server clusters.IEEE Transactions on Parallel and Distributed Systems,2011,22(2):245~259.
  • 9Xen Introduction.http://xen.xensource.com/media/xen/player.html.
  • 10Challener D,Yoder K,Catherman R,et al.A Practical Guide to Trusted Computing.IBM Press,2008.

共引文献63

同被引文献19

引证文献7

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部