1. Loganayagi, B., Sujatha, S.: Creating virtual platform for cloud computing. In: IEEE International Conference on Computational Intelligence and Computing Research (ICCIC 2010), pp. 1–4 (2010)
2. Karen, S., Murugiah, S., Paul, H.: Guide to Security for Full Virtualization Technologies, pp. 1–35. Special Publication National Institute of Standards and Technology (NIST) (2011)
3. Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization:. In: Proceedings of the 19th ACM Symposium on OS Principles. SOSP, pp. 164–177 (2003)
4. Dawei, S., Guiran, C., Qiang, G., Chuan, W., Xingwei, W.: A dependability model to enhance security of cloud environment using system-level virtualization techniques. In: 1st International Conference on Pervasive Computing. Signal Processing and Applications (PCSPA), pp. 305–310 (2010)
5. Joanna, R., Alexander, T.: Bluepilling the Xen Hypervisor. In: Xen owning Trilogy par-III, Black Hat USA, 2008, pp. 1–85 (2008)