Browse > Article

CE향(向) 가상화(Virtualization) 기술  

Seo, Sang-Beom (삼성전자)
Lee, Seong-Min (삼성전자)
Jang, Gyeong-A (삼성전자)
Yu, Jeong-Hyeon (삼성전자)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Ramon Caceres, Casey Carter, Chandra Narayanaswami, M. T. Raghunath, Reincarnating PCs with Portable SoulPads, ACM/USENIX MobiSys 2005, pp. 65-78
2 Sang-bum Suh, "Secure architecture and implementation of xen on arm for mobile devices," 4th Xen Summit at IBM TJ Watson, Yorktown Heights, NY, April 2007. http://www.xensource.com/files/xensummit4/Secure_Xen_ARM_xen-summit-04%_07_Suh.pdf
3 VMware, Take control of virtual desktops across the enterprise. http://www.vmware.com/products/ace
4 P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, "Xen and the art of virtualization," in Proceedings of the nineteenth ACM symposium on Operating systems principles(SOSP '03). New York, NY, USA: ACM, 2003, pp. 164-177
5 Secure Xen on ARM project, http://wiki.xensource.com/xenwiki/XenARM
6 G. Coker, "Xen Security Modules(XSM)," 3rd Xen Summit, IBM T.J. Watson, September 2006
7 David Chisnall, "The Definitive Guide to the Xen Hypervisor," Prentice Hall, 2007
8 Microsoft, Microsoft Virtualization support, http://www.microsoft.com/virtualization/default.mspx
9 Symantec Corporation, "SymbOS.Cabir," http://securityresponse.symantec.com/avcenter/venc/data/epoc.cabir.html
10 R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen, and J. Lepreau, "The Flask Security Architecture: System Support for Diverse Security Policies," In Proceedings of the 8th USENIX Security Symposium, 1999
11 U3 smart drive, Bring the power of portable software to your usb flash drive. http://www.u3.com/smart/default.aspx
12 Mojopac. Mojopac-take your pc in your pocket. http://www.mojopac.com/portal/content/splash.jsp.
13 J. Smith, and R. Nair, Virtual Machines, chapter 1, Morgan Kaufmann, 2005
14 R. Sailer, E. Valdez, T. Jaeger, R. Perez, L. van Doorn, J. L. Griffin, and S. Berger. "sHype: A secure hypervisor approach to trusted virtualized systems," IBM Research Report, 2005
15 IBM, IBM Research support, http://www.research.ibm.com/WearableComputing/SoulPad/soulpad.html