1 |
Ristenpart T , Tromer E , Shacham H , et al. Finance: status, innovations, resources and future challenges[J]. Managerial Finance, 2008 (6): 365-398.
|
2 |
Amazon relational database service (Amazon RDS). , 2012
|
3 |
Xen,the powerful open source industry standard for virtualization . , 2012
|
4 |
Azab A M , Ning P , Wang Z , et al. HyperSentry: enabling stealthy incontext measurement of hypervisor integrity. Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, USA, 2010: 38~49
|
5 |
Zhang Y , Juels A , Oprea A , et al. Home alonecoresidency detection in the cloud via sidechannel analysis. Proceedings of the 23nd IEEE Symposium on Security and Privacy, Oakland, USA, 2011: 313~328
|
6 |
Ye L , Zhang H , Shi J , et al. Verify cloud service level agreement. Proceedings of IEEE Global Communications Conference, Anaheim, USA, 2012: 777~782
|
7 |
Wang X , Zang J , Wang Z , et al. Selective hardware/software memory virtualization. Proceedings of the 7th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, Newport Beach, USA, 2011: 217~226
|
|
Zhu J , Jiang Z , Xiao Z , et al. Optimizing the performance of virtual machine synchronization for fault tolerance. IEEE Transactions on Computers, 2011,60(12): 1718~1729
|
9 |
Szefer J , Lee R B . Architectural support for hypervisorsecure virtualization. Proceedings of the 17th International Conference on Architectural Support for Programming Languages and Operating Systems, London, UK, 2012: 437~450
|
10 |
Payne B D , Carbone M D P , Lee W . Secure and flexible monitoring of virtual machines. Proceedings of the 23rd Annual Computer Security Applications Conference, Miami Beach, USA, 2007: 385~397
|
11 |
Tian H , Zhan Y , Wang Y M . Analysis of host authentication mechanism in current POD copy protection system. IEEE Transactions on Consumer Electronics, 2005,51(3): 922~924
|
12 |
Liu L , Chu R , Zhu Y , et al. DMSS: a dynamic memory scheduling system in server consolidation environments. Proceedings of the 15th IEEE International Symposium on Object/Component/ServiceOriented RealTime Distributed Computing Workshops, Shenzhen, China, 2012: 70~75
|
13 |
Baker Z K , Prasanna V K . A computationally efficient engine for flexible intrusion detection. IEEE Transactions on Very Large Scale Integration Systems, 2005,13(10): 1179~1189
|
14 |
Heo J , Zhu X , Padala P , et al. Memory overbooking and dynamic control of xen virtual machines in consolidated environments. Proceedings of 11th IFIP/IEEE International Symposium on Integrated Network Management, New York, USA, 2009: 630~637
|
15 |
Long N , Colin B , Nieto G , et al. Automated proofs for diffiehellmanbased key exchanges. Proceedings of the 24th IEEE Computer Security Foundations Symposium, France, 2011: 51~65
|
16 |
HPLA portable implementation of the highperformance linpack benchmark for distributedmemory computers. , 2012
|
17 |
Kistler M , Gunnels J , Brokenshire D , et al. Programming the linpack benchmark for roadrunner. IBM Journal of Research and Development, 2009,53(5): 1~11.
|
18 |
SPEC CPU2000. , 2012
|
19 |
Wang M , Wu X , Zhang W , et al. A conceptual platform of SLA in cloud computing. Proceedings of the IEEE 9th International Conference on Dependable, Autonomic and Secure Computing, Sydney, Australia, 2011: 1131~1135
|
20 |
Wang Z , Tang X , Luo X . Policybased SLAaware cloud service provision framework. Proceedings of 7th International Conference on Semantics Knowledge and Grid, Beijing, China, 2011: 114~121
|