iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/1837274.1837304
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T10:34:46Z","timestamp":1725618886491},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,6,13]]},"DOI":"10.1145\/1837274.1837304","type":"proceedings-article","created":{"date-parts":[[2010,10,28]],"date-time":"2010-10-28T10:47:40Z","timestamp":1288262860000},"page":"108-113","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Fine-grained I\/O access control based on Xen virtualization for 3G\/4G mobile devices"],"prefix":"10.1145","author":[{"given":"Sung-Min","family":"Lee","sequence":"first","affiliation":[{"name":"Samsung Electronics, Gyeonggi-Do, Korea"}]},{"given":"Sang-Bum","family":"Suh","sequence":"additional","affiliation":[{"name":"Samsung Electronics, Gyeonggi-Do, Korea"}]},{"given":"Jong-Deok","family":"Choi","sequence":"additional","affiliation":[{"name":"Samsung Electronics, Gyeonggi-Do, Korea"}]}],"member":"320","published-online":{"date-parts":[[2010,6,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_3_2_1_2_1","unstructured":"S. Suh \"Secure Architecture and Implementation of Xen on ARM for Mobile Device \" 4th Xen Summit IBM T.J. Watson April 2007. S. Suh \"Secure Architecture and Implementation of Xen on ARM for Mobile Device \" 4th Xen Summit IBM T.J. Watson April 2007."},{"volume-title":"Sun Microsystems","year":"2007","author":"Suh S.","key":"e_1_3_2_1_3_1","unstructured":"S. Suh , \" Secure Xen on ARM : Status and Driver Domain Separation,\" 5th Xen Summit , Sun Microsystems , November 2007 . S. Suh, \"Secure Xen on ARM: Status and Driver Domain Separation,\" 5th Xen Summit, Sun Microsystems, November 2007."},{"key":"e_1_3_2_1_4_1","unstructured":"Secure Xen on ARM project http:\/\/wiki.xensource.com\/xenwiki\/XenARM Secure Xen on ARM project http:\/\/wiki.xensource.com\/xenwiki\/XenARM"},{"volume-title":"USA","year":"2008","author":"Hwang J.","key":"e_1_3_2_1_5_1","unstructured":"J. Hwang , S. Suh , S. Heo , C. Park , J. Ryu , S. Park , C. Kim , \" Xen on ARM : System Virtualization using Xen Hypervisor for ARM-based Secure Mobile Phones,\" In Proceedings of the 5th Annual IEEE Consumer Communications & Networking Conference , USA , January 2008 . J. Hwang, S. Suh, S. Heo, C. Park, J. Ryu, S. Park, C. Kim, \"Xen on ARM: System Virtualization using Xen Hypervisor for ARM-based Secure Mobile Phones,\" In Proceedings of the 5th Annual IEEE Consumer Communications & Networking Conference, USA, January 2008."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.13"},{"volume-title":"sHype: A secure hypervisor approach to trusted virtualized systems,\" IBM Research Report","year":"2005","author":"Sailer R.","key":"e_1_3_2_1_7_1","unstructured":"R. Sailer , E. Valdez , T. Jaeger , R. Perez , L. van Doorn , J. L. Griffin , and S. Berger . \" sHype: A secure hypervisor approach to trusted virtualized systems,\" IBM Research Report , 2005 . R. Sailer, E. Valdez, T. Jaeger, R. Perez, L. van Doorn, J. L. Griffin, and S. Berger. \"sHype: A secure hypervisor approach to trusted virtualized systems,\" IBM Research Report, 2005."},{"key":"e_1_3_2_1_8_1","unstructured":"G. Coker \"Xen Security Modules (XSM) \" 3rd Xen Summit IBM T.J. Watson 2006. G. Coker \"Xen Security Modules (XSM) \" 3 rd Xen Summit IBM T.J. Watson 2006."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945464"},{"volume-title":"Symposium on Network and Distributed System Security (NDSS)","year":"2003","author":"Garfinkel T.","key":"e_1_3_2_1_10_1","unstructured":"T. Garfinkel , M. Rosenblum , \" A Virtual Machine Introspection Based on Architecture for Intrusion Detection ,\" Internet Society 's Symposium on Network and Distributed System Security (NDSS) , 2003 . T. Garfinkel, M. Rosenblum, \"A Virtual Machine Introspection Based on Architecture for Intrusion Detection,\" Internet Society's Symposium on Network and Distributed System Security (NDSS), 2003."},{"volume-title":"Proceedings of the 5th Annual IEEE Consumer Communications & Networking Conference, USA","year":"2008","author":"Lee S.","key":"e_1_3_2_1_11_1","unstructured":"S. Lee , S. Suh , B. Jeong , S. Mo , \" A Multi-Layer Mandatory Access Control Mechanism for Mobile Devices Based on Virtualization ,\" In Proceedings of the 5th Annual IEEE Consumer Communications & Networking Conference, USA , January 2008 . S. Lee, S. Suh, B. Jeong, S. Mo, \"A Multi-Layer Mandatory Access Control Mechanism for Mobile Devices Based on Virtualization,\" In Proceedings of the 5th Annual IEEE Consumer Communications & Networking Conference, USA, January 2008."},{"volume-title":"Safe Hardware Access with the Xen Virtual Machine Monitor,\" In Proceedings of the Workshop on Operating System and Architectural Support for the on-demand IT Infrastructure (OASIS)","year":"2004","author":"Fraser K.","key":"e_1_3_2_1_12_1","unstructured":"K. Fraser , S. Hand , R. Neugebauer , I. Pratt , A. Warfield , and M. Williamson , \" Safe Hardware Access with the Xen Virtual Machine Monitor,\" In Proceedings of the Workshop on Operating System and Architectural Support for the on-demand IT Infrastructure (OASIS) , 2004 . K. Fraser, S. Hand, R. Neugebauer, I. Pratt, A. Warfield, and M. Williamson, \"Safe Hardware Access with the Xen Virtual Machine Monitor,\" In Proceedings of the Workshop on Operating System and Architectural Support for the on-demand IT Infrastructure (OASIS), 2004."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502042"},{"volume-title":"Proceedings of the Workshop on Object Systems and Software Architectures","year":"2004","author":"Chubb P.","key":"e_1_3_2_1_15_1","unstructured":"P. Chubb , \" Linux Kernel Infrastructure for User-Level Device Drivers,\" In Proceedings of the Workshop on Object Systems and Software Architectures , 2004 . P. Chubb, \"Linux Kernel Infrastructure for User-Level Device Drivers,\" In Proceedings of the Workshop on Object Systems and Software Architectures, 2004."},{"key":"e_1_3_2_1_16_1","unstructured":"P. Chubb \"Get More Device Drivers out of the Kernel! \" Ottawa Linux Symposium 2004. P. Chubb \"Get More Device Drivers out of the Kernel! \" Ottawa Linux Symposium 2004."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1622103.1622104"},{"volume-title":"Proceedings of the 6th Annual IEEE Consumer Communications & Networking Conference, USA","year":"2009","author":"Sumpf S.","key":"e_1_3_2_1_18_1","unstructured":"S. Sumpf , J. Brakensiek , \" Device Driver Isolation within Virtualized Embedded Platforms ,\" In Proceedings of the 6th Annual IEEE Consumer Communications & Networking Conference, USA , January 2009 . S. Sumpf, J. Brakensiek, \"Device Driver Isolation within Virtualized Embedded Platforms,\" In Proceedings of the 6th Annual IEEE Consumer Communications & Networking Conference, USA, January 2009."},{"volume-title":"Proc. Of the ACM\/IFIP\/USENIX 7th International Middleware Conference (Middleware 2006","year":"2006","author":"Gupta D.","key":"e_1_3_2_1_19_1","unstructured":"D. Gupta , L. Cherkasova , R. Gardner , A. Vahdat , \" Enforcing Performance Isolation Across Virtual Machines in Xen ,\" In Proc. Of the ACM\/IFIP\/USENIX 7th International Middleware Conference (Middleware 2006 ), Australia , November 2006 . D. Gupta, L. Cherkasova, R. Gardner, A. Vahdat, \"Enforcing Performance Isolation Across Virtual Machines in Xen,\" In Proc. Of the ACM\/IFIP\/USENIX 7th International Middleware Conference (Middleware 2006), Australia, November 2006."},{"key":"e_1_3_2_1_20_1","unstructured":"Kprobes http:\/\/www.ibm.com\/developerworks\/library\/l-kprobes.html. Kprobes http:\/\/www.ibm.com\/developerworks\/library\/l-kprobes.html."},{"key":"e_1_3_2_1_21_1","unstructured":"xentop http:\/\/www.xen.org\/ xentop http:\/\/www.xen.org\/"},{"key":"e_1_3_2_1_22_1","unstructured":"iperf http:\/\/sourceforge.net\/projects\/iperf\/ iperf http:\/\/sourceforge.net\/projects\/iperf\/"},{"key":"e_1_3_2_1_23_1","unstructured":"Bonnie http:\/\/www.textuality.com\/bonnie\/ Bonnie http:\/\/www.textuality.com\/bonnie\/"}],"event":{"name":"DAC '10: The 47th Annual Design Automation Conference 2010","sponsor":["EDAC Electronic Design Automation Consortium","SIGDA ACM Special Interest Group on Design Automation","IEEE-CEDA"],"location":"Anaheim California","acronym":"DAC '10"},"container-title":["Proceedings of the 47th Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1837274.1837304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T17:54:49Z","timestamp":1673459689000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1837274.1837304"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6,13]]},"references-count":22,"alternative-id":["10.1145\/1837274.1837304","10.1145\/1837274"],"URL":"https:\/\/doi.org\/10.1145\/1837274.1837304","relation":{},"subject":[],"published":{"date-parts":[[2010,6,13]]},"assertion":[{"value":"2010-06-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}