{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:11:52Z","timestamp":1761621112661,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642328077"},{"type":"electronic","value":"9783642328084"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32808-4_5","type":"book-chapter","created":{"date-parts":[[2012,9,4]],"date-time":"2012-09-04T19:11:33Z","timestamp":1346785893000},"page":"41-51","source":"Crossref","is-referenced-by-count":7,"title":["A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment"],"prefix":"10.1007","author":[{"given":"Zahra","family":"Tavakoli","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Meier","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Vensmer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Cisco nexus 1000v series switches (March 2012), http:\/\/www.cisco.com\/en\/US\/solutions\/collateral\/ns340\/ns517\/ns224\/ns892\/ns894\/at_a_glance_c45-492852.pdf"},{"key":"5_CR2","unstructured":"Conntrack tools (March 2012), http:\/\/conntrack-tools.netfilter.org\/index.html"},{"key":"5_CR3","unstructured":"Kvm (March 2012), http:\/\/www.linux-kvm.org"},{"key":"5_CR4","unstructured":"Kvm live migration (March 2012), http:\/\/www.linux-kvm.org\/page\/Migration"},{"key":"5_CR5","unstructured":"Libvirt (March 2012), http:\/\/www.libvirt.org"},{"key":"5_CR6","unstructured":"Netfilter (March 2012), http:\/\/www.Netfilter.org"},{"key":"5_CR7","unstructured":"Qemu (March 2012), http:\/\/www.qemu.org"},{"key":"5_CR8","unstructured":"Vmware (March 2012), http:\/\/www.VMware.com"},{"key":"5_CR9","unstructured":"Xen (March 2012), http:\/\/www.xen.org"},{"key":"5_CR10","unstructured":"Arcangeli, A., Eidus, I., Wright, C.: Increasing memory density by using kvm. In: Proceedings of the Linux Symposium, pp. 19\u201328 (2009)"},{"key":"5_CR11","unstructured":"Dawoud, W., Takouna, I., Meinel, C.: Infrastructure as a service security: Challenges and solutions. Security (2010), http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=5461732"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Kent, S., Seo, K.: Security Architecture for the Internet Protocol. RFC 4301, IETF (December 2005)","DOI":"10.17487\/rfc4301"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Miao, Q.G., Hui-Liu, Zhang, X.G., Liu, Z.L., Yang, Y.Z., Yun-Wang, Yin-Cao: Developing a virtual network environment for analyzing malicious network behavior. In: 2010 International Conference on Educational and Network Technology (ICENT), pp. 271\u2013275 (June 2010)","DOI":"10.1109\/ICENT.2010.5532168"},{"key":"5_CR14","first-page":"37","volume":"86","author":"A. Shah","year":"2008","unstructured":"Shah, A.: Kernel-based virtualization with kvm. Linux Magazine\u00a086, 37\u201339 (2008), http:\/\/www.linux-magazine.com\/w3\/issue\/86\/Kernel_Based_Virtualization_With_KVM.pdf","journal-title":"Linux Magazine"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Wu, H., Ding, Y., Winer, C., Yao, L.: Network security for virtual machine in cloud computing. In: 2010 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), November 30-December 2, pp. 18\u201321 (2010)","DOI":"10.1109\/ICCIT.2010.5711022"},{"key":"5_CR16","unstructured":"Xianqin, C., Han, W., Sumei, W., Xiang, L.: Seamless virtual machine live migration on network security enhanced hypervisor. In: 2009 2nd IEEE International Conference on Broadband Network Multimedia Technology, pp. 847\u2013853 (2009), http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=5347800"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32808-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T21:22:41Z","timestamp":1744060961000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32808-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642328077","9783642328084"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32808-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}