<--- Back to Details
First PageDocument Content
System software / Computing / Software / Hypervisor / Trusted Computing / Protection ring / Hardware virtualization / Operating system / Virtualization / Malware / Embedded hypervisor / Qubes OS
Date: 2013-09-06 09:56:55
System software
Computing
Software
Hypervisor
Trusted Computing
Protection ring
Hardware virtualization
Operating system
Virtualization
Malware
Embedded hypervisor
Qubes OS

Microsoft Word - Weber_Weber_Virtualisation_English

Add to Reading List

Source URL: www.itas.kit.edu

Download Document from Source Website

File Size: 183,21 KB

Share Document on Facebook

Similar Documents

USING VMTURBO TO BOOST PERFORMANCE Assuring application performance in today’s virtualized datacenters is an increasingly complex task. Out of the box, vendor-specific hypervisor tools do a good job of balancing datac

DocID: 1uSEX - View Document

Breaking Up is Hard to Do: Security and Functionality in a Commodity Hypervisor Patrick Colp†, Mihir Nanavati†, Jun Zhu‡, William Aiello†, George Coker∗, Tim Deegan‡, Peter Loscocco∗, and Andrew Warfield†

DocID: 1utWI - View Document

NSX for Multi-Hypervisor 4 VPAT: VMware, Inc.

DocID: 1u0zh - View Document

MultiNyx: A Multi-Level Abstraction Framework for Systematic Analysis of Hypervisors Pedro Fonseca, Xi Wang, Arvind Krishnamurthy Hypervisor correctness is critical •

DocID: 1tUr9 - View Document

Enabling power-awareness for the Xen Hypervisor⇤ Matteo Ferroni Juan A. Colmenares Politecnico di Milano

DocID: 1tcXP - View Document