[1] George Cokder. Xen Security Modules (XSM) [C]. the Xen Summit of 2007. New York, April 17thand 18th, 2007. [2] Serdar Cabuk, Chris I. Dalton, HariGovind Ramasamy,et al. Towards automated provisioning of secure virtualised networks[C]. Proceedings of ACM CCS, 2007:12-14. [3] Zheng W M, Xu P Z, Huang X M, et al. Design a cloud storageplatform for pervasive computing environments [J]. Cluster Computing,2010, 13(2): 141-151. [4] Bell D E, La Padula L J.Secure computer systems: unified exposition and multics interpretation[R]. Bedford: MITRE Corporation, 1976. [5] Bell DE, La Padula LJ. Secure computer systems: Mathematical foundations[C]. ESD-TR-73-278, I (AD) 770 768, Electronic SystemsDivision, Air Force System Command, Hanscom AFB. Bedford, 1973. [6] Lei Yu, Chuliang Weng, Minglu Li, et al. Security challenges on the clone, snapshot, migration and rollback of Xen based computing environments[C]. Guangzhou China, Proceedings of the Fifth Annual CinaGrid Conference, 2012:223-227. [7] Miller, K. ,M. Pegah.Virtualization: virtually at the desktop[C]. in Proceedings of the 35th annual ACM SIGUCCS conference on User services. 2007, ACM: Orlando, Florida, USA. [8] Michael Factor, Dalit Naor, et al. Capability based Secure Access Control to Networked Storage Devices[C]. 24th IEEE Conference on Mass Storage Systems and Technologies, 2007:43-47. |