[1]
P. Barham et al., Xen and the Art of Virtualization, Proc. 19th ACM Symp. Operating Systems Princi-ples, ACM Press, 2003, pp.164-177.
Google Scholar
[2]
Microsoft Corp., Microsoft Virtual Server 2005 Technical Overview, 2004; http: /download. microsoft. com/download/5/5/3/55321426-cb43-4672-9123-74ca3af6911d/VS2005TechWP. doc.
Google Scholar
[3]
G.W. Dunlap et al., ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay, Proc. 5th Symp. Operating Systems Design and Implementation, Usenix, 2002, pp.211-224.
DOI: 10.1145/1060289.1060309
Google Scholar
[4]
T. Garfinkel et al., Terra: A Virtual Machine-Based Platform for Trusted Computing, Proc. 19th ACM Symp. Operating Systems Principles, ACM Press, 2003, pp.193-206.
DOI: 10.1145/1165389.945464
Google Scholar
[5]
P.B. England et al., A Trusted Open Platform, Computer, July 2003, pp.55-62.
Google Scholar
[6]
VMware Inc., Building Virtual Infrastructure withVMware VirtualCenter, white paper V00014-20001205, 2004; www. vmware. com/pdf/vi_wp. pdf.
Google Scholar
[7]
A. Whitaker, M. Shaw, and S. Gribble, Scale and Performance in the Denali Isolation Kernel, Proc. 5th Symp. Operating Systems Design and Implementation, Usenix, 2002, pp.195-210.
DOI: 10.1145/1060289.1060308
Google Scholar
[8]
T.C. Bressoud and F.B. Schneider, Hypervisor-Based Fault Tolerance, Proc. 15th ACM Symp. Operating Systems Principles, ACM Press, 1995, pp.1-11.
DOI: 10.1145/224056.224058
Google Scholar
[9]
Intel Corp., Intel Virtualization Technology Specification for the IA-32 Architecture;, www. intel. com/technology/vt.
Google Scholar
[10]
Intel Corp., Intel Virtualization Technology Specification for the Intel Itanium Architecture;, www. intel. com/technology/vt.
Google Scholar