[1] |
罗军舟, 金嘉晖, 宋爱波 . 云计算:体系架构与关键技术[J]. 通信学报, 2011,32(7):3-21. LUO J Z , JIN J H , SONG A B . Cloud computing:architect nd key technology[J]. Journal on Communications, 2011,32(7):3-21.
|
[2] |
BELLOVIN S M . Virtual machines,virtual security?[J]. munica-tions of the ACM, 2006,49(10):104.
|
[3] |
王丽娜, 高汉军, 刘炜 . 利用虚拟机监视器检测及管理隐藏进程[J]. 计算机研究与发展, 2011,48(8):1534-1541. WANG L N , GAN H J , LIU W . Detecting and managing hidden process VIA hypervisor[J]. Journal of Computer Research and Devel-op, 2011,48(8):1534-1541.
|
[4] |
BUSSANI A , GRIFIN J L , JANSEN B , et al. Trusted Virtual Domains:Secure Foundation for Business and IT Services[R]. Research Report RC 23792,IBM Research, 2005.3-15.
|
[5] |
GRIFIN J L , JAEGER T , PEREZ R , et al. Trusted virtual domains:toward secure distributed services[A]. Proc of the 1st IEEE Workshop on Hot Topics in System Dependability(HotDep'05)[C]. Berkeley:USENIX, 2005.4.
|
[6] |
CASADO M , KOPONEN T , MOON D , et al. Rethinking packet forwarding hardware[A]. Proc of the Seventh ACM Workshop on Hot Topics in Networks[C]. Calgary, 2008.1270-1276.
|
[7] |
GREENHALGH A , HUICI F , HOERDT M , et al. Flow processing and the rise of commodity network hardware[J]. Sigcomm CCR,2009, 2009,49(10):21-26.
|
[8] |
WANG Y , KELLER E , BISKEBORN B , et al. Virtual routers on the move:live router migration as a network-management primitive[A]. Pro of the ACM SIGCOMM 2008 Conference on Applications,Tech-nologies,Architectures,and Protocols for Computer Communica-tions[C]. Seattle, 2008.231-242.
|
[9] |
CHEN X , MORLEY Z , JACOBUS M , et al. ShadowNet:a platform for rapid and safe network evolution[A]. Proc of the 2009 Conference on USENIX Annual Technical Conference (2009)[C]. Sandigeo,USENIX, 2009.3.
|
[10] |
MCKEOWN N , ANDERSON T , BALAKRISHNAN H , et al. Open-Flow:enabling innovation in campus networks[A]. Proc of SIG-COMM CCR'08[C]. New York, 2008.69-74.
|
[11] |
BAVIER A , FEAMSTER N , HUANG M , et al. In VINI veritas:realis-tic and controlled network experimentation[A]. Pro of SIGCOMM 2008 Conference on Applications,Technologies,Archi-tectures,and Protocols for Computer Communications[C]. Pisa, 2006.3-14.
|
[12] |
ANDERSON T , PETERSON L , SHENKER S , et al. Overcoming the Internet impasse through virtualization[J]. Computer, 38(4):34-41.
|
[13] |
RIZZO L , CARBONE M , CATALLI G . Transparent acceleration of software packet forwarding using netmap[A]. Proc of 2012 INFO-COM[C]. Pisa, 2012.2471-2479.
|
[14] |
KOPONEN T , CASADO M , GUDE N . Onix:a distributed control platform for large-scale production networks[A]. Proc of the 9th USENIX Symposium on Operating Systems Design and Imple nta-tion(OSDI 10)[C]. Vancouver:USENIX, 2010.351-364.
|
[15] |
CATUOGNO L , DMITRIENKO A , ERIKSSON K , et al. Trusted virtual domains-design,implementation and lessons learned[A]. Proc of the 2009 INTRUST[C]. Heidelberg,Springer, 2009.156-179.
|
[16] |
SRIVASTAVA A , GIFFIN J . Tamper-resistant,application-aware blocking of malicious network connections[A]. Proc of '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection[C]. Berlin,Springer-Verlag, 2008.39-58.
|
[17] |
CASADO M , KOPONEN T , RAMANATHAN R , et al. Virtualizing the network forwarding plane[A]. Proc of the Workshop n Program-mable Routers for Extensible Services of Tomorrow[C]. 2010.908-914.
|
[18] |
BARHAM P , DRAGOVIC B , FRASER K , et al. Xen and the art of virtualization[A]. Proc of 19th ACM Symposium on Operating Sys-tems Principles(SOSP-2003)[C]. Bolton Landing, 2003.164-177.
|
[19] |
DAVOLI R . VDE:virtual distributed ethernet[A]. Proc of 1st Interna-tional Conference on Testbeds & Research Infrastructures for the DE-velopment of Networks & Communities(TRIDENTCOM 2005)[C]. Trento, 2005.213-220.
|
[20] |
ANHALT F , PRIMET P V B . Analysis and Evaluation of a Xen Based Virtual Router[R]. Technical Report 6658, Inria, 2008.
|
[21] |
PFAFF B , PETTIT J , KOPONEN T , et al. Extending networking into the virtualization layer[A]. Proc of The 8th ACM Workshop on Hot Topics in Networks[C]. New York, 2009.15-21.
|
[22] |
王丽娜, 高汉军, 余荣威 . 基于信任扩展的可信虚拟执行环境构建方法研究[J]. 通信学报, 2011,32(9):1-8. WANG L N , GAO H J , YU R W . Research of constructing tr ted vir-tual execution environment based on trust extension[J]. Journal on Communications, 2011,32(9):1-8.
|