A xen-based data sharing & access controlling method
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
Review: A survey of intrusion detection techniques in Cloud
Journal of Network and Computer Applications
Hi-index | 0.00 |
This paper firstly introduces in brief the current status of research and applications of virtualization technology (VT) and then presents a new method of building a bridge firewall based on Xen and developing independent extension of firewall for special purpose to supervise the host and guest system to enhance the computer system security. In addition, this paper also provides the test for the functions and performance of firewall extension and analyzes the outcomes.