2006
DOI: 10.1535/itj.1003.04
|View full text |Cite
|
Sign up to set email alerts
|

New Client Virtualization Usage Models Using IntelŴVirtualization Technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2007
2007
2010
2010

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Intel has proposed a secure client virtual machine monitor (VMM) architecture [3], in which two guest operating systems execute on a VT-x-based VMM called LVMM. Network communication and memory accesses in one guest are monitored by a program running on the other.…”
Section: A Hypervisors For Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…Intel has proposed a secure client virtual machine monitor (VMM) architecture [3], in which two guest operating systems execute on a VT-x-based VMM called LVMM. Network communication and memory accesses in one guest are monitored by a program running on the other.…”
Section: A Hypervisors For Securitymentioning
confidence: 99%
“…Network communication and memory accesses in one guest are monitored by a program running on the other. However, whether LVMM can be inserted into a running operating system is not mentioned in [3]. NICKLE [7] is a VMM-based system that prevents the execution of unauthorized kernel code.…”
Section: A Hypervisors For Securitymentioning
confidence: 99%
“…LVMM [22] uses a VMM that runs two VMs on desktop machines: a user partition VM for running a standard desktop operating system and a services partition VM for a small management operating system. LVMM allows the the user partition VM to directly handle most devices except for an NIC device.…”
Section: Related Workmentioning
confidence: 99%