[1] |
邹庆欣, 郝志宇, 云晓春 . 基于运行阶段特征的虚拟机实时迁移技术[J]. 通信学报, 2016,37(1): 170-179.
|
|
ZOU Q X , HAO Z Y , YUN X C . Live migration based on the characteristics of operation stages for virtual machine[J]. Journal on Communications, 2016,37(6): 170-179.
|
[2] |
ZHANG H G , HAN W B , LAI X J ,et al. Survey on cyberspace security[J]. Science China Information Sciences, 2015,58(11): 1-43.
|
[3] |
OBERHEIDE J , COOKE E , JAHANIAN F . Empirical exploitation of live virtual machine migration[C]// BlackHat DC convention. 2008.
|
[4] |
VAN C A , PIETERS W , WIERINGA R . Security implications of virtualization:a literature study[C]// IEEE International Conference on Computational Science and Engineering (CES). 2009: 353-358.
|
[5] |
YAMUNADEVI L , ARUNA P , DEVI D S ,et al. Security in virtual machine live migration for KVM[C]// International Conference on Process Automation,Control and Computing (PACC). 2011: 1-6.
|
[6] |
CHEN X , GAO X , WAN H ,et al. Application-transparent live migration for virtual machine on network security enhanced hypervisor[J]. China Communications, 2011,8(3): 32-42.
|
[7] |
NAGIN K , HADAS D , DUBITZKY Z ,et al. Inter-cloud mobility of virtual machines[C]// International Conference on Systems and Storage. 2011: 1-12.
|
[8] |
PATIL V P , PATIL G A . Migrating process and virtual machine in the cloud:load balancing and security perspectives[J]. International Journal of Advanced Computer Science & Information Technology, 2012,1(1): 11-19.
|
[9] |
BIN S N A , MASUDA H . Evaluation of a secure live migration of virtual machines using IPSEC implementation[C]// IEEE International Conference on Advanced Applied Informatics. 2014: 687-693.
|
[10] |
范伟, 孔斌, 张珠君 ,等. KVM 虚拟化动态迁移技术的安全防护模型[J]. 软件学报, 2016,27(6): 1402-1416.
|
|
FAN W , KONG B , ZHANG Z J ,et al. Security protection model on live migration for KVM virtualization[J]. Journal of Software, 2016,27(6): 1402-1416.
|
[11] |
WANG W , ZHANG Y , LIN B ,et al. Secured and reliable VM migration in personal cloud[C]// International Conference on Computer Engineering and Technology. 2010: 705-709.
|
[12] |
ASLAM M , GEHRMANN C , BJORKMAN M . Security and trust preserving VM migrations in public clouds[C]// IEEE International Conference on Trust,Security and Privacy in Computing and Communications. 2012: 869-876.
|
[13] |
ANATI I , GUERON S , JOHNSON S ,et al. Innovative technology for CPU based attestation and sealing[C]// International Workshop on Hardware and Architectural Support for Security and Privacy (HASP). 2013.
|
[14] |
HOEKSTRA M , LAL R , PAPPACHAN P ,et al. Using innovative instructions to create trustworthy software solutions[C]// International Workshop on Hardware and Architectural Support for Security and Privacy (HASP). 2013.
|
[15] |
Mckeen F , ALEXANDROVICH I , BERENZON A ,et al. Innovative instructions and software model for isolated execution[C]// International Workshop on Hardware and Architectural Support for Security and Privacy (HASP). 2013.
|
[16] |
BERGER S , CACERES R ,et al. vTPM:virtualizing the trusted platform module[C]// The 15th conference on USENIX Security Symposium. 2006: 305-320.
|
[17] |
SHI Y , ZHAO B , YU Z ,et al. A security-improved scheme for virtual TPM based on KVM[J]. Wuhan University Journal of Natural Sciences, 2015,20(6): 505-511.
|
[18] |
FAN P R , ZHAO B , SHI Y . An improved vTPM-VM live migration protocol[J]. Wuhan University Journal of Natural Sciences, 2015,20(6): 512-520.
|