1 |
王鹏, 黄华峰, 曹珂 . 云计算:中国未来的IT战略. 北京: 人民邮电出版社, 2010
|
2 |
《虚拟化与云计算》小组. 虚拟化与云计算. 北京: 电子工业出版社, 2009
|
3 |
张为民, 唐剑峰, 罗志国 . 云计算深刻改变未来. 北京: 科学出版社, 2009
|
4 |
于嘉 . 基于TPM的虚拟机安全协议的设计与实现. 上海交通大学硕士学位论文, 2008
|
5 |
王昊鹏, 刘旺盛 . 虚拟化技术在云计算中的应用初探. 电脑知识与技术, 2008,7(3)
|
6 |
Jasti A , Shah P , Nagaraj R , et al. Security in multi-tenancy cloud. Proceedings of 2010 IEEE International Carnahan Conference on Security Technology (ICCST), San Jose, CA, 2010:35~41
|
7 |
Hanqian Wu , Yi Ding , Winer Chuck , et al. Network security for virtual machine in cloud computing. Proceedings of 5th International Conference on Computer, Sciences and Convergence Information Technology(ICCIT), Seoul, Korea, 2010:18~21
|
8 |
Tim Mather , Subra Kumaraswamy , Shahed Latif . Cloud Security and Privacy. OˊReilly Media, 2009
|
9 |
Yanfeng Zhang , Cuirong Wang , Yuan Gao . A QoS-oriented network architecture based on virtualization. Proceedings of First International Workshop on Education Technology and Computer Science, Wuhan, China, 2009:959~963
|
10 |
Sehgal N K , Ganguli M . Applications of virtualization for server management and security. Proceedings of IEEE International Conference on Industrial Technology (ICIT), Mumbai, India, 2006:2 752~2 755
|
11 |
Xiaorui Wang , Yefu Wang . Coordinating power control and performance management for virtualized server clusters. IEEE Transactions on Parallel and Distributed Systems, 2011,22(2):245~259
|
12 |
闻剑峰, 龚德志 . 虚拟化技术在电信灾难恢复计划中的应用研究. 电信科学, 2009,25(9):16~20
|
13 |
Xen Introduction.
|
14 |
江迎春 . VMware和Xen 虚拟网络性能比较. 软件导刊, 2009,8(5):133~134
|
15 |
石磊, 邹德清, 金海 . Xen 虚拟化技术. 武汉: 华中科技大学出版社, 2009
|
16 |
程川 . 一种基于Xen的信任虚拟机安全访问设计与实现. 计算机数字与工程, 2010,38(3):109~111
|
17 |
Challener D , Yoder K , Catherman R , et al. A Practical Guide to Trusted Computing. IBM Press, 2008
|
18 |
陈小峰 . 可信平台模块的形式化分析和测试. 计算机学报, 2009,32(4):646~653
|
19 |
刘海雷, 王震宇, 马鸣锦 . 嵌入式可信终端TPM接口的研究与实现. 计算机工程与设计, 2008,29(13):16~19
|
20 |
Chen P M , Noble B D . When virtual is better than real. Proceedings of the 8th Workshop on HotTopics in Operating Systems, IEEE Computer Society, Washington, DC, USA, 2001
|
21 |
Ongaro D , Cox A L , Rixner S . Scheduling I/O in virtual machine monitors. Proceedings of the fourth ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, Seattle, WA, 2008
|
22 |
Lei Yu , Chuliang Weng , Minglu Li , et al. Security challenges on the clone, snapshot, migration and rollback of Xen based computing environments. Proceedings of the Fifth Annual ChinaGrid Conference, Guangzhou, China, 2010:223~227
|