{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T08:46:01Z","timestamp":1725612361153},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/chinagrid.2010.47","type":"proceedings-article","created":{"date-parts":[[2010,9,8]],"date-time":"2010-09-08T20:20:02Z","timestamp":1283977202000},"page":"223-227","source":"Crossref","is-referenced-by-count":1,"title":["Security Challenges on the Clone, Snapshot, Migration and Rollback of Xen Based Computing Environments"],"prefix":"10.1109","author":[{"given":"Lei","family":"Yu","sequence":"first","affiliation":[]},{"given":"Chuliang","family":"Weng","sequence":"additional","affiliation":[]},{"given":"Minglu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Luo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Virtualization Aware File Systems: Getting Beyond the Limitations of Virtual Disks","author":"ben","year":"2006","journal-title":"3rd Symposium of Networked Systems Design and Implementation (NSDI)"},{"key":"ref3","first-page":"41","article-title":"Parallax: Virtual Disks for Virtual Machines","author":"dutch","year":"2008","journal-title":"Proceedings of the 3rd ACM SIGOPS\/EuroSys European Conference on Computer Systems"},{"key":"ref6","article-title":"How to Login from an Internet Cafe without Worrying about Keyloggers","author":"herley","year":"0","journal-title":"Proceedings of Symposium on Usable Privacy and Security (S0UPS)'06"},{"key":"ref5","article-title":"Mendel R.: When virtual is harder than real","author":"tal","year":"2005","journal-title":"Security challenges in virtual machine based computing environments 10th Workshop on Hot Topics in Operating Systems"},{"key":"ref8","article-title":"A virtual machine-based platform for trusted computing","author":"garfinkel","year":"2003","journal-title":"Proceedings of 19th Symposium on Operating Systems Principles"},{"key":"ref7","first-page":"169","article-title":"Fab: Enterprise storage systems on a shoestring","author":"fralund","year":"2003","journal-title":"Proceedings of HotOS'03 9th Workshop on Hot Topics in Operating Systems Lihue (Kauai)"},{"key":"ref2","first-page":"151","article-title":"The s\/keytm one-time password system","author":"haller","year":"0","journal-title":"Symposium on Network and Distributed System Security"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294291"},{"key":"ref1","article-title":"A One-Time Password System","author":"haller","year":"1998","journal-title":"IETF rfc2289"}],"event":{"name":"2010 Fifth Chinagrid Annual Conference (ChinaGrid)","start":{"date-parts":[[2010,7,16]]},"location":"Guangzhou, TBD, China","end":{"date-parts":[[2010,7,18]]}},"container-title":["2010 Fifth Annual ChinaGrid Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5562735\/5562862\/05562878.pdf?arnumber=5562878","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T23:43:53Z","timestamp":1489880633000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5562878\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/chinagrid.2010.47","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}