共 8 条
- [1] http://hi.baidu.com/xifengtang/blog/item/339eee07d0f7cfc17b8947ab.html .
- [2] Efficiently TrackingApplication Interactions Using Lightweight Virtualization. Yih Huang,Angelos Stavrou,Anup K Ghosh,Sushil Jajodia. VMSec workshop of CCS‘ 08 .
- [3] Using Virtual Machines to Do CrossLayer Damage Assessment. Xiaoqi Jia,Shengzhi Zhang,Jiwu Jing,Peng Liu. VMSec workshop of CCS‘ 08 .
- [4] VEP:a Virtual Machine for Extended Proof-Carrying Code. Heidar Pirzadeh,Danny Dubé. VMSec workshop of CCS‘ 08 .
- [5] Secure Control of Portable Images in a Virtual Computing Utility. Ionut Constandache,Aydan Yumerefendi,Jeff Chase. VMSec workshop of CCS‘ 08 .
- [6] http://www.vmware.com/cn/technology/virtual-infrastructure.html .
- [7] A Survey on Virtual Machine Security. Jenni Susan,Reuben. TKK T-110.5290 Seminar onNetwork Security . 2007
- [8] Hyper-V Security. William Arbaugh,Brandon Baker. VMSec workshop of CCS‘08 .