參考文獻 |
[1] Fang Hao, T.V. Lakshman, Sarit Mukherjee, and Haoyu Song, “Enhancing Dynamic Cloud-based Services using Network Virtualization”, In VISA, 2009.
[2] Fang Hao, T.V. Lakshman, Sarit Mukherjee, and Haoyu Song, “Secure Cloud Computing with a Virtualized Network Infrastructure”, Proceeding in HotCloud'10 Proceedings of the 2nd USENIX conference on Hot topics in cloud computing.
[3] Amazon Elastic Compute Cloud (Amazon EC2) http://aws.amazon.com/ec2/
[4] Wayne A. Jansen, “Cloud Hooks: Security and Privacy Issues in Cloud Computing”, Proceedings of the 44th Hawaii International Conference on System Sciences - 2011.
[5] T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds.” In CCS, 2009.
[6] Huan Liu, “A new form of DOS attack in a cloud and its avoidance mechanism”, proceedings of the 2010 ACM workshop on Cloud computing security workshop.
[7] Sebastian Roschke, Feng Cheng, and Christoph Meinel, “Intrusion Detection in the Cloud,” Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009, pp.729-734.
[8] Trusted Computing Group. http://www.trustedcomputinggroup.org/
[9] TCG Architecture Overview, Version 1.4 http://www.trustedcomputinggroup.org/resources/tcg_architecture_overview_version_14
[10] The Trusted Computing Group Trusted Platform Module specification version 1.2 http://www.trustedcomputinggroup.org/resources/tpm_main_specification
[11] Infineon’s Website: http://www.infineon.com
[12] Reiner Sailer, Enriquillo Valdez, Trent Jaeger Jaeger, Ronald Perez, Leendert van Doorn, John Linwood Griffin, and Stefan Berger, “sHype: Secure Hypervisor Approach to Trusted Virtualized Systems”, IBM Research Report RC23511(W0502-006) http://domino.watson.ibm.com/library/cyberdig.nsf/3addb4b88e7a231f85256b3600727773/265c8e3a6f95ca8d85256fa1005cbf0f?OpenDocument
[13] Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ronald Perez, Stefan Berger, John Linwood Griffin, and Leendert van Doorn, “Building a MAC-based Security Architecture for the Xen Opensource Hypervisor”, IBM Research Report RC23629(W0506-051) http://domino.watson.ibm.com/library/cyberdig.nsf/1e4115aea78b6e7c85256b360066f0d4/5ff6b8de618bcf30852570230052518a?OpenDocument
[14] Stefan Berger, Ramon Caceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, and Leendert van Doorn, “vTPM: Virtualizing the Trusted Platform Module”, Proceedings of the 15th USENIX Security Symposium, Berkeley, CA, USA, 2006. USENIX Association, pp. 21-21.
[15] James E. Smith, AND Ravi Nair, “Virtual Machines: Versatile Platforms for Systems And Processes”, Morgan Kaufmann Publishers, San Francisco, CA, USA, 2005.
[16] VMware, Inc. 3401 Hillview Ave Palo Alto. “VMware Server 2 - A Risk-Free Way to Get Started with Virtualization” http://www.vmware.com
[17] Christopher Clark, Keir Fraser, Steven Hand, Jacob Gorm Hansen, Eric Jul, Christian Limpach, Ian Pratt, and Andrew Warfield, “Live Migration of Virtual Machines.” In Proceedings of the 2nd ACM/USENIX Symposium on Networked Systems Design and Implementation, Boston, MA, May 2005.
[18] 林冠余,“實體系統執行程序至虛擬平台之動態遷移”,國立中央大學資訊工程學系碩士論文,民98
[19] Jacob Gorm. Hansen and Asger Kahl Henriksen, “Master's Thesis: Nomadic Operating Systems”, Dept. of Computer Science, University of Copenhagen, Denmark, 2002.
[20] Erik Elmroth and Lars Larsson, “Interfaces for Placement, Migration, and Monitoring of Virtual Machines in Federated Clouds”, 2009 Eighth International Conference on Grid and Cooperative Computing.
[21] Mudassar Aslam, and Christian Gehrmann, "Security Considerations for Virtual Platform Provisioning", Workshop on Cryptography and Security in Clouds (March 15-16, 2011, Zurich)
[22] Jinzhu Kong, “Protecting The Confidentiality of Virtual Machines Against Untrusted Host”, 2010 International Symposium on Intelligence Information Processing and Trusted Computing.
[23] Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, and Dan Boneh, “Terra: A Virtual Machine-Based Platform for Trusted Computing”, In Proceeding of SOSP’03, 2003.
[24] Wei Wang, Ya Zhang, Ben Lin, Xiaoxin Wu, and Kai Miao, “Secured and Reliable VM Migration in Personal Cloud”, In 2nd International Conference on ICCET 2009.
[25] Kara Nance, Matt Bishop, and Brian Hay, “Virtual Machine Introspection: Observation or Interference?”, In Proceeding of IEEE Symposium on Security and Privacy, pages 32-37, 2008.
[26] Brian Hay , Kara Nance, “Forensics Examination of Volatile System Data Using Virtual Introspection”, ACM Sigops Operating Systems Review, vol. 42, no. 3, April 2008, pp. 74–82.
[27] Home of the XEN hypervisor http://www.xen.org/
[28] Intel 64 and IA-32 Architectures Software Developer’s Manual Combined Volumes 3A and 3B: System Programming Guide, Parts 1 and 2.
[29] Intel® Virtualization Technology for Directed I/O, Revision 1.3 specification http://download.intel.com/technology/computing/vptech/Intel(r)_VT_for_Direct_IO.pdf
|