1. T. Ormandy, “An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments,” Proc. of CanSecWest applied Security conf. (Vancouver, Canada, 2007).
2. M. Kerrisk, “Access Control Lists,” in The Linux Programming Interface. A Linux and UNIX System Programming Handbook, edited by R. Hoffman (No Starch Press, San Francisco, CA, 2010), pp. 319–338.
3. The use of name spaces in Plan 9
4. D. Price and A. Tucker, “Solaris Zones: Operating System Support for Consolidating Commercial Workloads,” Proc. Conf. on System administration (USENIX, USA, 2004), pp. 241–254.
5. A performance comparison of linux containers and virtual machines using Docker and KVM