1 |
Daeyoung Hong, Wonseok Ko and Sungsoo Lim, "Virtualization Techniques for Secure and Reliable Computing", The Journal of Korea Institute of Information Scientists and Engineering, Vol. 26, No. 10, pp. 50-57, 2008.
|
2 |
Sejung Lim, Gwangjun Kim and Taegeun Kang, "Application Program Virtualization besed on Desktop Virtualization", The Journal of the Korea Institute of Electronic Communication Sciences, Vol. 5, No. 6, pp. 595-601, 2010.
|
3 |
Heiser Gernot, Elphinstone, Kevin Kuz, Ihor Klein, Gerwin, Petters, and Stefan M. "Towards Trustworthy Computing Systems: Taking Microkernels to the Next Level", Operating Systems Review Vol. 41, No. 3, pp. 3-11, 2007.
|
4 |
Jiyeon Kim, Hyungjong Kim, Choonsik Park and Myungjoo Kim, "A Study on the Analysis of Virtualization Techniques Vulnerability in Cloud Computing Environment", The Journal of Korea Institute of Informaion Security and Crypthology, Vol. 19, No. 4, pp. 72-77, 2009.
|
5 |
L. Cherkasova, D. Gupta, and A. Vahdat, "Comparison of the three cpu schedulers in xen," SIGMETRICS Perform. Eval. Rev., Vol. 35, No. 2, pp. 42-51, 2007.
DOI
ScienceOn
|
6 |
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, "Xen and the art of virtualization", in SOSP'03: Proceedings of the nineteenth ACM symposium on Operating systems principles. New York, NY, USA : ACM, pp. 164-177, 2003.
|
7 |
D. Ongaro, A. L. Cox, and S. Rixner, "Scheduling I/o in virtual machine monitors," in VEE'08 : Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments. New York, NY, USA : ACM, pp, 1-10, 2008.
|
8 |
Chiyeon Kim, "A Study for Transaction Processing Supporting Scalability in the Cloud", The Journal of the Korea Institute of Electronic Communication Sciences, Vol. 7, No. 4, pp. 873-879, 2012.
과학기술학회마을
|
9 |
Inhyuk Kim, Taehyoung Kim, Junghan Kim, Byounghong Lim and YoungIk Eom, "Virtualization Techniques Application Trend for System Secure", The Journal of Korea Institute of Informaion Security and Crypthology, Vol. 19, No. 2, pp. 26-34, 2009.
|
10 |
Sejung Lim, Gwangjun Kim and Taegeun Kang, "Important Information Protection using Client Vitualization", The Journal of the Korea Institute of Electronic Communication Sciences, Vol. 6, No. 1, pp. 111-117, 2011.
|