期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
巧借气体虚拟态 化解变质量难题
1
作者 郭公礼 《数理化解题研究》 2022年第34期123-125,共3页
用统一的压强、温度和虚拟出的新体积构造出理想气体的末状态,利用质量守恒即虚拟的新体积守恒来解题,把气体变质量问题变成虚拟态体积的聚散问题,用统一的通用方法解决五类变质量问题.
关键词 理想气体 虚拟态 变质量 通用方法
在线阅读 下载PDF
延迟存储:一种降低虚拟机退出开销的方法
2
作者 吴瑞阳 台运方 《高技术通讯》 CAS CSCD 北大核心 2015年第6期593-598,共6页
研究了虚拟机退出及恢复运行时的开销问题,提出了一种用于降低虚拟机切换时进行保存及恢复现场的开销的延迟存储方法。该方法的主要思想是利用修改虚拟机软件源代码的方式,通过判断虚拟机恢复运行时是否依然是上次退出时的同一个虚拟机... 研究了虚拟机退出及恢复运行时的开销问题,提出了一种用于降低虚拟机切换时进行保存及恢复现场的开销的延迟存储方法。该方法的主要思想是利用修改虚拟机软件源代码的方式,通过判断虚拟机恢复运行时是否依然是上次退出时的同一个虚拟机,来减少需要保存和恢复的寄存器数量。这个方法不需要对硬件设计进行改动,可以支持多核操作系统和多个虚拟机同时运行的情况,因此具有广泛的适用性。在龙芯3A1500处理器平台上的试验结果显示,上述延迟存储方法与现有方法相比,可以降低虚拟机退出开销65%,虚拟机整体性能提升3%到10%。 展开更多
关键词 系统拟化 虚拟态 拟机退出 延迟存储
在线阅读 下载PDF
DIV: Dynamic Integrity Validation Framework for Detecting Compromises on Virtual Machine Based Cloud Services in Real Time 被引量:2
3
作者 WANG Chunlu LIU Chuanyi +1 位作者 LIU Bin DONG Yingfei 《China Communications》 SCIE CSCD 2014年第8期15-27,共13页
with the increasing popularity of cloud services,attacks on the cloud infrastructure also increase dramatically.Especially,how to monitor the integrity of cloud execution environments is still a difficult task.In this... with the increasing popularity of cloud services,attacks on the cloud infrastructure also increase dramatically.Especially,how to monitor the integrity of cloud execution environments is still a difficult task.In this paper,a real-time dynamic integrity validation(DIV) framework is proposed to monitor the integrity of virtual machine based execution environments in the cloud.DIV can detect the integrity of the whole architecture stack from the cloud servers up to the VM OS by extending the current trusted chain into virtual machine's architecture stack.DIV introduces a trusted third party(TTP) to collect the integrity information and detect remotely the integrity violations on VMs periodically to avoid the heavy involvement of cloud tenants and unnecessary information leakage of the cloud providers.To evaluate the effectiveness and efficiency of DIV framework,a prototype on KVM/QEMU is implemented,and extensive analysis and experimental evaluation are performed.Experimental results show that the DIV can efficiently validate the integrity of files and loaded programs in real-time,with minor performance overhead. 展开更多
关键词 cloud security remote attestation trusted computing cloud trustworthiness
在线阅读 下载PDF
A Symmetric Key Exchange Protocol Bsaed on Virtual S-Box 被引量:2
4
作者 YIN Yifeng GAN Yong WEN Heyu LI Tianbao 《China Communications》 SCIE CSCD 2014年第A02期46-52,共7页
Based on the theory of polymorphic virtual S-box, the paper presents a symmetric key exchange protocol to solve the problem of session keys delete shared in the computational complexity temporary trading scenario. Bot... Based on the theory of polymorphic virtual S-box, the paper presents a symmetric key exchange protocol to solve the problem of session keys delete shared in the computational complexity temporary trading scenario. Both parties jointly construct a highly nonlinear SPN core algorithm. The paper the connotation of polymorphic cipher theory, making use of the method of self-compiler based expansion factor to collect random parameter sets held by each of the parties containing its own information 5-tuple private keys array Kpa[5] and Kpb[5].The more efficient polymorphism virtual S-box is constructed. The method of secret split for the public key cryptography features can be implemented by symmetry cipher system. The research results will provide a theoretical basis to solve the key exchange problems for short- term communications partner based on symmetric cryptography. 展开更多
关键词 virtual S-box the virtual iterativefunction (VIF) secrecy sub-systems
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部