共 14 条
[1]
ABLES T, OVERWIER XEN VIRTUAL
[2]
CARR J, 2008, 2 VULNERABILITIES FO
[3]
*CITR SYST INC, VIRT MACH RES SHAR C
[4]
GOIRI I, MANAGEMENT AUTONOMIC
[5]
Hyde D., 2009, SURVEY SECURITY VIRT
[6]
Kirch J., 2007, Virtual machine security guidelines
[7]
LEE M, SUPPORTING SOFT REAL
[8]
Owens K., Securing Virtual Compute Infrastructure in the Cloud
[9]
Ristenpart T., 2009, 16 ACM C COMP COMM S
[10]
*VMWARE INC, VMWARE WORKST 5 5