CN103580885B - The monitoring method and physical node of cloud environment - Google Patents
The monitoring method and physical node of cloud environment Download PDFInfo
- Publication number
- CN103580885B CN103580885B CN201210252209.8A CN201210252209A CN103580885B CN 103580885 B CN103580885 B CN 103580885B CN 201210252209 A CN201210252209 A CN 201210252209A CN 103580885 B CN103580885 B CN 103580885B
- Authority
- CN
- China
- Prior art keywords
- monitoring
- domain
- called
- vmm
- credible
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
Description
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210252209.8A CN103580885B (en) | 2012-07-20 | 2012-07-20 | The monitoring method and physical node of cloud environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210252209.8A CN103580885B (en) | 2012-07-20 | 2012-07-20 | The monitoring method and physical node of cloud environment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103580885A CN103580885A (en) | 2014-02-12 |
CN103580885B true CN103580885B (en) | 2017-05-31 |
Family
ID=50051875
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210252209.8A Active CN103580885B (en) | 2012-07-20 | 2012-07-20 | The monitoring method and physical node of cloud environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103580885B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9967319B2 (en) * | 2014-10-07 | 2018-05-08 | Microsoft Technology Licensing, Llc | Security context management in multi-tenant environments |
CN108491306A (en) * | 2018-03-19 | 2018-09-04 | 广东电网有限责任公司珠海供电局 | One kind being based on enterprise's private clound credibility monitoring method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101834860A (en) * | 2010-04-22 | 2010-09-15 | 北京交通大学 | Method for remote dynamic verification on integrality of client software |
CN101866408A (en) * | 2010-06-30 | 2010-10-20 | 华中科技大学 | Transparent trust chain constructing system based on virtual machine architecture |
CN102136043A (en) * | 2010-01-22 | 2011-07-27 | 中国长城计算机深圳股份有限公司 | Computer system and measuring method thereof |
CN102214277A (en) * | 2010-04-01 | 2011-10-12 | 中国科学院计算技术研究所 | Method and device for establishing trusted environments for virtual machine system of multicore processor |
-
2012
- 2012-07-20 CN CN201210252209.8A patent/CN103580885B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102136043A (en) * | 2010-01-22 | 2011-07-27 | 中国长城计算机深圳股份有限公司 | Computer system and measuring method thereof |
CN102214277A (en) * | 2010-04-01 | 2011-10-12 | 中国科学院计算技术研究所 | Method and device for establishing trusted environments for virtual machine system of multicore processor |
CN101834860A (en) * | 2010-04-22 | 2010-09-15 | 北京交通大学 | Method for remote dynamic verification on integrality of client software |
CN101866408A (en) * | 2010-06-30 | 2010-10-20 | 华中科技大学 | Transparent trust chain constructing system based on virtual machine architecture |
Also Published As
Publication number | Publication date |
---|---|
CN103580885A (en) | 2014-02-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11652852B2 (en) | Intrusion detection and mitigation in data processing | |
US10902121B2 (en) | Policy-based detection of anomalous control and data flow paths in an application program | |
CN104715201B (en) | A kind of virtual machine malicious act detection method and system | |
US10540191B2 (en) | Systems and methods for using dynamic templates to create application containers | |
US8356285B2 (en) | Facilitated introspection of virtualized environments | |
CN101866408B (en) | Transparent trust chain constructing system based on virtual machine architecture | |
US8566823B2 (en) | Systems and methods for triggering scripts based upon an alert within a virtual infrastructure | |
US20160019393A1 (en) | Trusted Boot of a Virtual Machine | |
CN102214277B (en) | Method and device for establishing trusted environments for virtual machine system of multicore processor | |
CN101853346A (en) | Virtual machine snapshot and damage suppress | |
CN106201566A (en) | The rich big special hot upgrade method of software of profit and equipment | |
TWI737172B (en) | Computer system, computer program product and computer implement method for incremental decryption and integrity verification of a secure operating system image | |
Patrascu et al. | Logging system for cloud computing forensic environments | |
CN103580885B (en) | The monitoring method and physical node of cloud environment | |
Sanán et al. | Separation kernel verification: The xtratum case study | |
US10120777B1 (en) | Remediating serialization incompatibilities | |
Mofrad et al. | SecDATAVIEW: a secure big data workflow management system for heterogeneous computing environments | |
US11886326B2 (en) | Configuring test operations on a per-module basis | |
EP3506136A9 (en) | Detecting stack cookie utilization in a binary software component using binary static analysis | |
Kankhare et al. | A cloud based system to sense security vulnerabilities of web application in open-source private cloud IAAS | |
US20240135261A1 (en) | Methods and systems for constructing an ontology of log messages with navigation and knowledge transfer | |
CN107577953A (en) | A kind of system and method based on CUSE simulation credible password modules | |
Zirari et al. | Cross Virtual Machine Security: A Survey | |
Chen et al. | A Detection Approach for Buffer Overflow Vulnerability Based on Data Control Flow Graph | |
Wu et al. | C 2 hunter: Detection and mitigation of covert channels in data centers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20171208 Address after: 510640 Guangdong City, Tianhe District Province, No. five, road, public education building, unit 371-1, unit 2401 Patentee after: Guangdong Gaohang Intellectual Property Operation Co., Ltd. Address before: 518129 Bantian HUAWEI headquarters office building, Longgang District, Guangdong, Shenzhen Patentee before: Huawei Technologies Co., Ltd. |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20171229 Address after: 510000 Room 601, room six, No. 1421, No. 1421, Guangzhou Avenue, Baiyun District, Baiyun District, Guangdong Patentee after: Guangdong David project management Limited by Share Ltd Address before: 510640 Guangdong City, Tianhe District Province, No. five, road, public education building, unit 371-1, unit 2401 Patentee before: Guangdong Gaohang Intellectual Property Operation Co., Ltd. |
|
TR01 | Transfer of patent right | ||
CP01 | Change in the name or title of a patent holder |
Address after: 510000 601 building, six / F, 1421 St. Plaza, North Guangzhou Avenue, Baiyun District, Guangzhou, Guangdong, China Patentee after: Limited by Share Ltd in central Daan Address before: 510000 601 building, six / F, 1421 St. Plaza, North Guangzhou Avenue, Baiyun District, Guangzhou, Guangdong, China Patentee before: Guangdong David project management Limited by Share Ltd |
|
CP01 | Change in the name or title of a patent holder |