{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T22:27:58Z","timestamp":1648592878108},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,2,1]],"date-time":"2010-02-01T00:00:00Z","timestamp":1264982400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci. China"],"published-print":{"date-parts":[[2010,3]]},"DOI":"10.1007\/s11704-009-0076-5","type":"journal-article","created":{"date-parts":[[2010,1,31]],"date-time":"2010-01-31T21:16:22Z","timestamp":1264972582000},"page":"47-64","source":"Crossref","is-referenced-by-count":4,"title":["TRainbow: a new trusted virtual machine based platform"],"prefix":"10.1007","volume":"4","author":[{"given":"Yuzhong","family":"Sun","sequence":"first","affiliation":[]},{"given":"Haifeng","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Song","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Du","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hongyong","family":"Zang","sequence":"additional","affiliation":[]},{"given":"Yaqiong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yajun","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Ran","family":"Ao","sequence":"additional","affiliation":[]},{"given":"Yongbing","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Yunwei","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,2,1]]},"reference":[{"key":"76_CR1","unstructured":"Smith J, Nair R. Virtual machine: versatile platform for systems and processes. Morgan Kaufmann, 2005, 11\u201312"},{"key":"76_CR2","doi-asserted-by":"crossref","unstructured":"Song Y, Wang H, Li Y Q, Feng B Q, Sun Y Z. Multi-tiered ondemand resource scheduling for VM-based data center. In: Proceedings of the 9th IEEE\/ACM International Symposium on Cluster Computing and the Grid (CCGrid). 2009, 148\u2013155","DOI":"10.1109\/CCGRID.2009.11"},{"key":"76_CR3","unstructured":"Armbrust M, Fox A, Griffith R, et al. Above the Clouds: A Berkeley View of Cloud. Technical Report No. UCB\/EECS-2009-28, 2009"},{"key":"76_CR4","unstructured":"Stallman R. Cloud Computing a Trap. http:\/\/www.linux-magazine.com\/Online\/News\/Richard-Stallman-Cloud-Computing-a-Trap"},{"key":"76_CR5","unstructured":"Wood T, Shenoy P, Gerber A, et al. The case for enterprise-ready virtual private clouds. In: Workshop on Hot Topics in Cloud Computing (HotCloud), San Diego, CA. 2009"},{"key":"76_CR6","unstructured":"http:\/\/www.grid.org.il\/Uploads\/dbsAttachedFiles\/IDC_Cloud_Computing_IGT_final.ppt"},{"key":"76_CR7","unstructured":"http:\/\/www.linuxvirtualserver.org\/"},{"key":"76_CR8","unstructured":"Lagar-Cavilla H A, Whitney J, Scannell A, et al. Impromptu Clusters for Near-Interactive Cloud-Based Services. Technical Report CSRG-TR578, Department of Computer Science, University of Toronto, 2008"},{"key":"76_CR9","unstructured":"Lutterkort D, McLoughlin M. Manageable virtual appliances. In: Proceedings of Linux Symposium, Ottawa, Canada. 2007, 293\u2013302"},{"key":"76_CR10","doi-asserted-by":"crossref","unstructured":"Kumar S, Schwan K. Netchannel: a VMM-level mechanism for continuous, transparentdevice access during VM migration. In: Proceedings of the 4th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments (VEE), Seattle, WA, USA. 2008, 31\u201340","DOI":"10.1145\/1346256.1346261"},{"key":"76_CR11","doi-asserted-by":"crossref","unstructured":"Barham P, Dragovic B, Fraser K, et al. Xen and the art of virtualization. In: Proceedings of the 19th ACM Symp. on Operating Systems Principles (SOSP). 2003, 164\u2013177","DOI":"10.1145\/945445.945462"},{"key":"76_CR12","first-page":"259","volume":"2","author":"R. C. Nickolai","year":"2005","unstructured":"Nickolai R C, Chandra R, Zeldovich N, et al. The collective: a cache-based system management architecture. In: Proceedings of the 2nd conference on Symposium on Networked Systems Design and Implementation (NSDI). 2005, 2: 259\u2013272","journal-title":"Proceedings of the 2nd conference on Symposium on Networked Systems Design and Implementation (NSDI)"},{"issue":"21","key":"76_CR13","first-page":"305","volume":"15","author":"S. Berger","year":"2006","unstructured":"Berger S, C\u00e1ceres R, Goldman K A, et al. vTPM: virtualizing the trusted platform module. In: Proceedings of the 15th Conference on USENIX Security Symposium. 2006, 15(21): 305\u2013320","journal-title":"Proceedings of the 15th Conference on USENIX Security Symposium"},{"key":"76_CR14","unstructured":"Sailer R, Valdez E, Jaeger T, et al. sHype: Secure Hypervisor Approach to Trusted Virtualized Systems. Techn. Rep. RC23511, Feb. 2005. IBM Research Division"},{"key":"76_CR15","doi-asserted-by":"crossref","unstructured":"Song Y, Li Y Q, Wang H, et al. A service-oriented priority-based resource scheduling scheme for virtualized utility computing. In: Proceedings of the International Conference on High Performance Computing (HiPC), 2008, LNCS 5374, 220\u2013231","DOI":"10.1007\/978-3-540-89894-8_22"},{"key":"76_CR16","unstructured":"Garfinkel T, Rosenblum M. When virtual is harder than real: security challenges in virtual machine based computing environments. In: Proceedings of the 10th Conference on Hot Topics in Operating Systems (HotOS). 2005, 133\u2013138"},{"issue":"5","key":"76_CR17","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1145\/224057.224076","volume":"29","author":"D. R. Engler","year":"1995","unstructured":"Engler D R, Kaashoek M F, O\u2019Toole Jr J. Exokernel: an operating system architecture for application-level resource management. ACM SIGOPS Operating Systems Review, 1995, 29(5): 251\u2013266","journal-title":"ACM SIGOPS Operating Systems Review"},{"issue":"2","key":"76_CR18","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1177\/109434200101500205","volume":"15","author":"R. Buyya","year":"2001","unstructured":"Buyya R, Cortes T, Jin H. Single system image (SSI). The International Journal of High Performance Computing Applications, 2001, 15(2): 124\u2013135","journal-title":"The International Journal of High Performance Computing Applications"},{"key":"76_CR19","unstructured":"Walker B, Steel D. Implementing a full single system image Unix Ware cluster: middleware vs. underware. In: Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA), Las Vegas, NV. 1999, 2767\u20132773"},{"key":"76_CR20","unstructured":"Renaud L, Pascal G, Geoffroy V, Christine M. Openmosix, OpenSSI and kerrighed: a comparative study. In: IEEE International Symp. on Cluster Computing. and the Grid (CCGrid), Cardiff, UK. 2005, 1016\u20131023"},{"key":"76_CR21","doi-asserted-by":"crossref","unstructured":"Wood T, Tarasuk-Levin G, Shenoy P, et al. Memory buddies: exploiting page sharing for smart colocation in virtualized data centers. In: Proceedings of the 4th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments (VEE). 2009, 31\u201340","DOI":"10.1145\/1508293.1508299"},{"issue":"5","key":"76_CR22","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MC.2006.156","volume":"39","author":"A. Tanenbaum","year":"2006","unstructured":"Tanenbaum A, Herder J, Bos H. Can we make operating systems reliable and secure? IEEE Computer, 2006, 39(5): 44\u201351","journal-title":"IEEE Computer"},{"issue":"5","key":"76_CR23","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MSP.2008.119","volume":"6","author":"P. A. Karger","year":"2008","unstructured":"Karger P A, Safford D R. I\/O for virtual machine monitors: security and performance issues. IEEE Security and Privacy, 2008, 6(5): 16\u201323","journal-title":"IEEE Security and Privacy"},{"key":"76_CR24","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1007\/978-3-540-75444-2_56","volume":"4782","author":"J. P. Wei","year":"2007","unstructured":"Wei J P, Jackson J, Wiegert J. Towards scalable and high performance I\/O virtualization - a case study. Lecture Notes in Computer Science (LNCS), 2007, 4782: 586\u2013598","journal-title":"Lecture Notes in Computer Science (LNCS)"},{"key":"76_CR25","unstructured":"Trusted Computing Group. TPM main specification, main specification version 1.2 revision 94, 2006"},{"key":"76_CR26","unstructured":"AMD. Secure Virtual Machine Architecture Reference Manual, May 2005"},{"key":"76_CR27","unstructured":"Sailer R, Zhang X L, Jaeger T, et al. Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the 13th Conference on USENIX Security Symposium. 2004, 223\u2013238"},{"key":"76_CR28","first-page":"137","volume-title":"Proceedings of the 6th Symp. on Operating System Design and Implementation (OSDI)","author":"J. Dean","year":"2004","unstructured":"Dean J, Ghemawat S. MapReduce: simplified data processing on large clusters. In: Proceedings of the 6th Symp. on Operating System Design and Implementation (OSDI). Berkeley: USENIX Association, 2004, 137\u2013150"},{"key":"76_CR29","unstructured":"Average Web Page Size Triples Since 2003. Apr 28, 2008, http:\/\/www.websiteoptimization.com\/speed\/tw-eak\/average-web-page\/"},{"key":"76_CR30","doi-asserted-by":"crossref","unstructured":"Zang H Y, Gu K Y, Li Y Q, et al. A highly efficient inter-domain communication channel. In: IEEE 9th International Conference on Computer and Information Technology (CIT). 2009, 369\u2013374","DOI":"10.1109\/CIT.2009.50"},{"key":"76_CR31","doi-asserted-by":"crossref","unstructured":"Wang J, Wright K L, Gopalan K. XenLoop: a transparent high performance Inter-VM network loopback. In: Proceedings of International Symposium on High Performance Distributed Computing (HPDC). 2008, 109\u2013118","DOI":"10.1145\/1383422.1383437"}],"container-title":["Frontiers of Computer Science in China"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-009-0076-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-009-0076-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-009-0076-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T17:01:14Z","timestamp":1559408474000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-009-0076-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,2,1]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,3]]}},"alternative-id":["76"],"URL":"https:\/\/doi.org\/10.1007\/s11704-009-0076-5","relation":{},"ISSN":["1673-7350","1673-7466"],"issn-type":[{"value":"1673-7350","type":"print"},{"value":"1673-7466","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,2,1]]}}}