{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T19:58:40Z","timestamp":1762459120378},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642409240"},{"type":"electronic","value":"9783642409257"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40925-7_22","type":"book-chapter","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T11:54:58Z","timestamp":1379591698000},"page":"229-240","source":"Crossref","is-referenced-by-count":12,"title":["Security Aspects of Virtualization in Cloud Computing"],"prefix":"10.1007","author":[{"given":"Muhammad","family":"Kazim","sequence":"first","affiliation":[]},{"given":"Rahat","family":"Masood","sequence":"additional","affiliation":[]},{"given":"Muhammad Awais","family":"Shibli","sequence":"additional","affiliation":[]},{"given":"Abdul Ghafoor","family":"Abbasi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Orlando, D.: Cloud computing service models, \n                    \n                      http:\/\/www.ibm.com\/developerworks\/cloud\/library\/cl-cloudservices1iaas\/cl-cloudservices1iaas-pdf.pdf\n                    \n                    \n                   (last accessed: October 27, 2012)"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Hoffman, P., Scarfone, K., Souppaya, M.: Guide to security for full virtualization technologies. National Institute of Standards and Technology (NIST), 800\u2013125 (2011)","DOI":"10.6028\/NIST.SP.800-125"},{"key":"22_CR3","unstructured":"Brunette, G., Mogull, R., et\u00a0al.: Security guidance for critical areas of focus in cloud computing v2.1. Cloud Security Alliance, 1\u201376 (2009)"},{"key":"22_CR4","unstructured":"Council, V.S.I.G.P.S.S.: Pci dss virtualization guidelines v2.0, 1\u201339 (2011)"},{"key":"22_CR5","unstructured":"ALERTLOGIC: State of cloud security report: Targeted attacks and real world hacks, \n                    \n                      http:\/\/www.alertlogic.com\/resources\/cloud-security-report\/\n                    \n                    \n                   (last accessed: April 14, 2013)"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Szefer, J., Keller, E., Lee, R.B., Rexford, J.: Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 401\u2013412. ACM (2011)","DOI":"10.1145\/2046707.2046754"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Szefer, J., Lee, R.B.: A case for hardware protection of guest vms from compromised hypervisors in cloud computing. In: 2011 31st International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 248\u2013252. IEEE (2011)","DOI":"10.1109\/ICDCSW.2011.51"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Kong, J.: Protecting the confidentiality of virtual machines against untrusted host. In: 2010 International Symposium on Intelligence Information Processing and Trusted Computing (IPTC), pp. 364\u2013368. IEEE (2010)","DOI":"10.1109\/IPTC.2010.11"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Gofman, M.I., Luo, R., Yang, P., Gopalan, K.: Sparc: a security and privacy aware virtual machinecheckpointing mechanism. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, pp. 115\u2013124. ACM (2011)","DOI":"10.1145\/2046556.2046571"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Jin, S., Ahn, J., Cha, S., Huh, J.: Architectural support for secure virtualization under a vulnerable hypervisor. In: Proceedings of the 44th Annual IEEE\/ACM International Symposium on Microarchitecture, pp. 272\u2013283. ACM (2011)","DOI":"10.1145\/2155620.2155652"},{"key":"22_CR11","unstructured":"Ibrahim, A.S., Hamlyn-harris, J.H., Grundy, J.: Emerging security challenges of cloud virtual infrastructure (2010)"},{"key":"22_CR12","unstructured":"Reuben, J.S.: A survey on virtual machine security. Helsinki University of Technology (2007)"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Khan, R.H., Ylitalo, J., Ahmed, A.S.: Openid authentication as a service in openstack. In: 2011 7th International Conference on Information Assurance and Security (IAS), pp. 372\u2013377. IEEE (2011)","DOI":"10.1109\/ISIAS.2011.6122782"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Rueda, S., Sreenivasan, Y., Jaeger, T.: Flexible security configuration for virtual machines. In: Proceedings of the 2nd ACM Workshop on Computer Security Architectures, pp. 35\u201344. ACM (2008)","DOI":"10.1145\/1456508.1456515"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Wang, Z., Jiang, X.: Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 380\u2013395. IEEE (2010)","DOI":"10.1109\/SP.2010.30"},{"issue":"1","key":"22_CR16","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/1341312.1341319","volume":"42","author":"D. Pelleg","year":"2008","unstructured":"Pelleg, D., Ben-Yehuda, M., Harper, R., Spainhower, L., Adeshiyan, T.: Vigilant\u2013out-of-band detection of failures in virtual machines. Operating Systems Review\u00a042(1), 26 (2008)","journal-title":"Operating Systems Review"},{"issue":"4","key":"22_CR17","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.1016\/j.jnca.2010.06.008","volume":"34","author":"F. Lombardi","year":"2011","unstructured":"Lombardi, F., Di Pietro, R.: Secure virtualization for cloud computing. Journal of Network and Computer Applications\u00a034(4), 1113\u20131122 (2011)","journal-title":"Journal of Network and Computer Applications"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Wei, J., Zhang, X., Ammons, G., Bala, V., Ning, P.: Managing security of virtual machine images in a cloud environment. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 91\u201396. ACM (2009)","DOI":"10.1145\/1655008.1655021"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Zhou, W., Ning, P., Zhang, X., Ammons, G., Wang, R., Bala, V.: Always up-to-date: scalable offline patching of vm images in a compute cloud. In: Proceedings of the 26th Annual Computer Security Applications Conference, pp. 377\u2013386. ACM (2010)","DOI":"10.1145\/1920261.1920317"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40925-7_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T07:47:25Z","timestamp":1558079245000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40925-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642409240","9783642409257"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40925-7_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}