參考文獻 |
[1] 毛文波、邊瑞鋒和李芳,「雲計算網絡虛擬化原理與實現」,CCISA(資訊安全通訊)期刊,第20卷,第1期,10~30頁,2014年1月。
[2] D. Taylor and J. Turner, “Towards a diversified internet,” White Pap. Novemb., 2004.
[3] J. S. Turner and D. E. Taylor, “Diversifying the internet,” in Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM’05. IEEE, Vol. 2, p. 6–pp, 2005.
[4] N. M. Chowdhury and R. Boutaba, “A survey of network virtualization,” Comput. Netw., Vol. 54, No. 5, pp. 862–876, 2010.
[5] R. Zalenski, “Firewall technologies,” Potentials IEEE, Vol. 21, No. 1, pp. 24–29, 2002.
[6] G. Rouskas, “Network Virtualization: A Tutorial,” in Proceedings of the Optical Fiber Communication Conference, p. OW1A–1, 2012.
[7] N. M. K. Chowdhury and R. Boutaba, “Network virtualization: state of the art and research challenges,” Commun. Mag. IEEE, Vol. 47, No. 7, pp. 20–26, 2009.
[8] R. G. Patricio and J. Celestino, “Hephaestus: A cloud-based environment to virtual network automation,” in Proceedings of the Computers and Communications (ISCC), 2013 IEEE Symposium on, pp. 000567–000571, 2013.
[9] I. Ayadi, N. Simoni, and G. Diaz, “NaaS: QoS-aware Cloud Networking Services,” in Proceedings of the Network Computing and Applications (NCA), 2013 12th IEEE International Symposium on, pp. 97–100, 2013.
[10] P. Costa, M. Migliavacca, P. Pietzuch, and A. L. Wolf, “NaaS: Network-as-a-Service in the Cloud,” in Proceedings of the 2nd USENIX conference on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services, Hot-ICE, Vol. 12, pp. 1–1, 2012.
[11] T. Choi, N. Kodirov, T.-H. Lee, D. Kim, and J. Lee, “Autonomic management framework for cloud-based virtual networks,” in Proceedings of the Network Operations and Management Symposium (APNOMS), 2011 13th Asia-Pacific, pp. 1–7, 2011.
[12] Y.-M. Chen, C.-E. Chuang, H.-C. Liu, C.-Y. Ni, and C.-T. Wang, “Using Agent in Virtual Machine for Interactive Security Training,” in Security Technology, Springer, pp. 65–74, 2011.
[13] X. Li and Z. Zhan, “Visio-Based Method for User Mapping Topology Graph in Network Management System,” in Proceedings of the Biomedical Engineering and Computer Science (ICBECS), 2010 International Conference on, pp. 1–4, 2010.
[14] Y. LI and W. LIU, “Analysis of the Shortest Route in Network on Dijkstra Algorithm,” Microcomput. Appl., Vol. 3, p. 007, 2004.
[15] S. D. Sorden, “A cognitive approach to instructional design for multimedia learning,” Informing Sci. Int. J. Emerg. Transdiscipl., Vol. 8, pp. 263–279, 2005.
[16] M.-X. Chen and K.-L. Mei, “Mechanism of Automatic Deployment for Virtual Network Environment,” in Proceedings of the Parallel Processing (ICPP), 2013 42nd International Conference on, pp. 1061–1066, 2013.
[17] D. Kakadia and V. Varma, “Network Virtualization Platform for Hybrid Cloud,” in Proceedings of the Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on, Vol. 2, pp. 69–74, 2013.
[18] J. B. Siu and Z. S. Guo, “Web-based network configuration management system,” in Proceedings of the Communication Technology, 2000. WCC-ICCT 2000. International Conference on, Vol. 1, pp. 487–491, 2000.
[19] M. Hibler, R. Ricci, L. Stoller, J. Duerig, S. Guruprasad, T. Stack, K. Webb, and J. Lepreau, “Large-scale Virtualization in the Emulab Network Testbed.,” in Proceedings of the USENIX Annual Technical Conference, pp. 113–128, 2008.
[20] D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov, “The eucalyptus open-source cloud-computing system,” in Proceedings of the Cluster Computing and the Grid, 2009. CCGRID’09. 9th IEEE/ACM International Symposium on, pp. 124–131, 2009.
[21] T. Benzel, “The science of cyber security experimentation: the DETER project,” in Proceedings of the 27th Annual Computer Security Applications Conference, pp. 137–148, 2011.
[22] P.-W. Tsai, Y.-T. Lai, P.-W. Cheng, C.-S. Yang, and M.-Y. Luo, “Design and develop an OpenFlow Testbed within virtualized architecture,” in Proceedings of the Network Operations and Management Symposium (APNOMS), 2013 15th Asia-Pacific, pp. 1–3, 2013.
[23] S.-J. Chen, J.-Y. Huang, C.-T. Huang, and W.-J. Wang, “SAMEVED: A System Architecture for Managing and Establishing Virtual Elastic Datacenters,” Int. J. Grid High Perform. Comput. IJGHPC, Vol. 5, No. 2, pp. 27–42, 2013.
[24] “Dropbox for Business security: A Dropbox whitepaper.” [Online]. Available: https://www.dropbox.com/static/business/resources/Security_Whitepaper.pdf.
[25] “hicloud VPC產品介紹,” hicloud VPC. [Online]. Available: http://hicloud.hinet.net/vpc/products.html.
[26] “Amazon Virtual Private Cloud,” Amazon Virtual Private Cloud. [Online]. Available: http://aws.amazon.com/cn/vpc/.
[27] “Introducing Amazon Virtual Private Cloud (VPC),” Amazon Web Services Blog. [Online]. Available: http://aws.typepad.com/aws/2009/08/introducing-amazon-virtual-private-cloud-vpc.html.
[28] “Amazon web services白皮書,” Amazon. [Online]. Available: http://media.amazonwebservices.com/AWS_Risk_and_Compliance_Whitepaper.pdf.
[29] “私有雲架構,” MiCloud. [Online]. Available: http://micloud.tw/ch/component/k2/item/241-private-cloud.
[30] “Virtual Private Cloud-as-a-Service: Extend Enterprise Security Policies to Public Clouds.” [Online]. Available: http://www.cisco.com/web/strategy/docs/gov/46113_cloud.pdf.
[31] “Azure 虛擬網路,” Microsoft Azure. [Online]. Available: http://azure.microsoft.com/zh-tw/services/virtual-network/.
[32] “Secure Data Connector,” Google Developers. [Online]. Available: https://developers.google.com/secure-data-connector/docs/1.3/overview.
[33] “中華電信hicloud虛擬私雲 成功協助桃園國際機場建置混合雲,” NetAdmin. [Online]. Available: http://www.netadmin.com.tw/article_content.aspx?sn=1307180001.
[34] 劉慈明, “台大、神通、基龍米克斯 三方合作研發 國內第一朵生技雲誕生.” [Online]. Available: http://www.mitac.com.tw/pdf/%E7%94%9F%E6%8A%80%E9%9B%B2.pdf.
[35] “企業建置雲端辦公環境 私有雲商機日增,” DIGITIMES. [Online]. Available: http://www.digitimes.com.tw/tw/dt/n/shwnws.asp?CnlID=13&packageid=6151&id=0000287907_XPX8068I1T3KGF6B3NV8W&cat=50&ct=1.
[36] “DeterLab,” The Deter Project. [Online]. Available: http://deter-project.org/about_deter_project.
[37] “中央大學雲端安全實驗平台(Cloud Security Experimental Platform),” 中央大學雲端安全實驗平台. [Online]. Available: http://csep.mgt.ncu.edu.tw/.
[38] “SAMEVED,” OpenFoundry. [Online]. Available: http://www.openfoundry.org/of/projects/2313.
[39] “ISO 9241-210,” ISO. [Online]. Available: http://www.iso.org/iso/catalogue_detail.htm?csnumber=52075.
[40] “automatic,” Oxford Learner’s Dictionaries. [Online]. Available: http://www.oxfordlearnersdictionaries.com/definition/english/automatic_1.
[41] “ISO/IEC 7498-4.” ISO. [Online]. Available: http://www.iso.org/iso/catalogue_detail.htm?csnumber=14258.
[42] “Amazon Web Services CLI Tools,” Amazon Web Services CLI Tools. [Online]. Available: http://docs.aws.amazon.com/general/latest/gr/GetTheTools.html.
[43] “Amazon Virtual Private Cloud CLI Tools,” Amazon Virtual Private Cloud CLI Tools. [Online]. Available: http://awsdocs.s3.amazonaws.com/VPC/latest/vpc-qrc.pdf.
[44] “Emulab,” Emulab.Net. [Online]. Available: http://www.emulab.net/.
[45] “NS Script,” Emulab. [Online]. Available: https://wiki.emulab.net/wiki/Tutorial.
[46] “Emulab Client GUI (Alpha),” Emulab. [Online]. Available: http://www.emulab.net/netlab/client.php3.
[47] “Testbed@TWISC,” Testbed@TWISC. [Online]. Available: http://testbed.ncku.edu.tw/index.php3.
[48] “About POX.” [Online]. Available: http://www.noxrepo.org/pox/about-pox/.
[49] “Netbuild,” Netbuild. [Online]. Available: http://icl.cs.utk.edu/netbuild/index.html.
[50] “Critical Patch Updates, Security Alerts and Third Party Bulletin,” ORACLE. [Online]. Available: http://www.oracle.com/technetwork/topics/security/alerts-086861.html. |