[1] Islam T, Manivannan D, Zeadally S. A classification and characterization of security threats in cloud computing[J]. International Journal of Next-Generation Computing, 2016, 7(1):1-17.
[2] Khari M, Gupta S, Kumar M. Security outlook for cloud computing:a proposed architectural-based security classification for cloud computing[C]//2016 International Conference on Computing for Sustainable Global Development (INDIACom). NJ:IEEE, 2016:2153-2158.
[3] Khurana R, Gupta H. A hybrid model on cloud security[C]//20165th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions). NJ:IEEE, 2016:347-352.
[4] Chen Lin, Chen Xingshu, Jiang Junfang, et al. Research and practice of dynamic network security architecture for IaaS platforms[J]. Tsinghua Science and Technology, 2014, 19(5):496-507.
[5] 俞能海, 郝卓, 徐甲甲, 等. 云安全研究进展综述[J]. 电子学报, 2013, 41(2):371-381. Yu Nenghai, Hao Zhuo, Xu Jiajia, et al. Review of cloud computing security[J]. Acta Electronica Sinica, 2013, 41(2):371-381.
[6] 金鑫, 陈兴蜀. 可信链跨物理主机迁移及快速恢复方法[J]. 武汉大学学报(理学版), 2016(2):103-109. Jin Xin, Chen Xingshu. Rapid restoration of migrated trusted chain between physical machines[J]. Journal of Wuhan University (Natural Science Edition), 2016(2):103-109.
[7] Zhang Lei, Chen Xingshu, Liu Liang, et al. Trusted domain hierarchical model based on noninterference theory[J]. The Journal of China Universities of Posts and Telecommunications, 2015, 22(4):7-16.
[8] Oberheide J, Cooke E, Jahanian F. Rethinking antivirus:executable analysis in the network cloud[C]//2nd USENIX Workshop on Hot Topics in Security (HotSec 2007). Berkeley:USENIX, 2007:1-5.
[9] Zheng Xufei, Fang Yonghui. An ais-based cloud security model[C]//2010 International Conference on Intelligent Control and Information Processing. NJ:IEEE, 2010:153-158.
[10] Oberheide J, Cooke E, Jahanian F. CloudAV:N-version antivirus in the network cloud[C]//USENIX Security Symposium. Berkeley:USENIX, 2008:91-106.
[11] Nachenberg C. Antivirus accelerator:U. S, 6021510[P]. 2000-02-01.
[12] McAfee. McAfee management for optimized virtual environments AntiVirus[EB/OL].[2017-03-24]. https://www.mcafee.com/cn/resources/data-sheets/ds-move-anti-virus.pdf.
[13] Kivity A, Kamay Y, Laor D, et al. KVM:the Linux virtual machine monitor[C]//Proceedings of the Linux Symposium. Ottawa:USENIX, 2007:225-230.
[14] Uhlig R, Neiger G, Rodgers D, et al. Intel virtualization technology[J]. Computer, 2005, 38(5):48-56.
[15] Bellard F. QEMU, a fast and portable dynamic translator[C]//USENIX Annual Technical Conference, FREENIX Track. Berkeley:USENIX, 2005:41-46.
[16] McLoughlin M. The QCOW2 image format[EB/OL]. Orinda:GNOME Foundation, 2008[2017-03-24]. https://people.gnome.org/~markmc/qcow-image-format.html.
[17] ClamAV. ClamAV official website[EB/OL].[2018-1-6]. https://www.clamav.net/. |