[1] ALJAWARNEH S A, ALAWNEH A, JARADAT R. Cloud security engineering:early stages of SDLC[J]. Future Generation Computer Systems, 2017, 74:385-392. [2] 王泽武,孙磊,郭松辉.基于滚动优化的密码云实时任务阈值调度方法[J].计算机应用,2017,37(10):2780-2786.(WANG Z W, SUN L, GUO S H. Real-time task threshold scheduling method for cryptography cloud based on rolling optimization[J]. Journal of Computer Applications, 2017, 37(10):2780-2786.) [3] 张玉清,王晓菲,刘雪峰,等.云计算环境安全综述[J].软件学报,2016,27(6):1328-1348.(ZHANG Y Q, WANG X F, LIU X F, et al. Cloud computing environment safety review[J]. Journal of Software, 2016, 27(6):1328-1348. [4] 林闯,苏文博,孟坤,等.云计算安全:架构、机制与模型评价[J].计算机学报,2013,36(9):1765-1784.(LIN C, SU W B, MENG K, et al. Cloud computing security:architecture, mechanism and model evaluation[J]. Chinese Journal of Computers, 2013, 36(9):1765-1784. [5] MALEK M, PAI V, PAUL WALTERS J, et al. Bridging the virtualization performance gap for HPC using SR-IOV for InfiniBand[C]//Proceedings of the 2014 IEEE International Conference on Cloud Computing. Piscataway, NJ:IEEE, 2014:627-635. [6] DONG Y Z, YANG X W, LI J H, et al. High performance network virtualization with SR-IOV[C]//Proceedings of the 2010 IEEE International Symposium on High Performance Computer Architecture. Piscataway, NJ:IEEE, 2010:1471-1480. [7] LI J, XUE S, ZHANG W, et al. When I/O interrupt becomes system bottleneck:efficiency and scalability enhancement for SR-IOV network virtualization[J]. IEEE Transactions on Cloud Computing, 2017, PP(99):1-1. [8] TU C-C, FERDMAN M, LEE C-T, et al. A comprehensive implementation and evaluation of direct interrupt delivery[J]. ACM SIGPLAN Notices, 2015, 50(7):1-15. [9] GORDON A, AMIT N, HAR'EL N, et al. ELI:bare-metal performance for I/O virtualization[C]//Proceedings of the 2012 Seventeenth International Conference on Architectural Support for Programming Languages & Operating Systems. New York:ACM, 2012:411-422. [10] HU X, ZHANG W, LI J. ES2:aiming at an optimal virtual I/O event path[C]//Proceedings of the 2017 International Conference on Parallel Processing. Washington, DC:IEEE Computer Society. 2017:141-150. [11] RICHTER A, HERBER C, WALLENTOWITZ S, et al. A hardware/software approach for mitigating performance interference effects in virtualized environments using SR-IOV[C]//Proceedings of the 2015 IEEE International Conference on Cloud Computing. Washington, DC:IEEE Computer Society, 2015:950-957. [12] YANG N X, CHEN Y F, QIN M. Study on trusted virtual machine platform based on cipher card[C]//Proceedings of the 2015 IEEE International Conference on Measuring Technology & Mechatronics Automation. Piscataway, NJ:IEEE, 2015:1101-1104. [13] DONG Y Z, CHEN Y, PAN Z H, et al. ReNIC:architectural extension to SR-IOV I/O virtualization for efficient replication[J]. ACM Transactions on Architecture & Code Optimization, 2012, 8(4):1-22. [14] KIM T, NO J, PIAO Z, et al. I/O access frequency-aware cache method on KVM/QEMU[J]. Cluster Computing, 2017, 20(3):2143-2155. [15] HUANG Z Q, MA R H, LI J, et al. Adaptive and scalable optimizations for high performance SR-IOV[C]//Proceedings of the 2012 IEEE International Conference on Cluster Computing. Washington, DC:IEEE Computer Society, 2012:459-467. |