Kriativ-techVolume 1, Issue 1, March 2018, Pages: xxxReceived: Nov. 28, 2017;Accepted: Dec. 8, 2017;Published: Feb. 24, 2018
Authors
Media
To cite this article
Pedro Ramos Brandão, Virtualização: fundamentosDOI: 10.31112/kriativ-tech-2018-01-01
Abstract
We will briefly review the historical context of the concept of virtualization. We'll try to explain the key facts that drive solution providers to virtualization, enumerate the various types of virtualization, define their components, and discuss security issues that are directly related to virtualization.
Keywords
References
[1] G. MELL, “The NIST Definition of Cloud Computing version 15,” National Institute of Standars and technology, Information Technology Laboratory, USA, 2009. [2] V. WINKLER, Securing The Cloud, USA: Syngress, 2011. [3] H. SWANSON, “NIST Special Publication 800-18 - Guideline for Developing Security Plans for Federal Information Systems,” US Department of Commerce, USA, 2006. [4] E. SIRON, Hyper-V Security, USA: PACKT, 2014. [5] ISO-27001, “ISO 27001,” [Online]. Available: https://www.27001.pt. [6] ISO-27002, “ISO 27002,” [Online]. Available: http://www.iso27001security.com/html/27002.html. [7] N. POOL, “NTP POOL PROJECT,” NTP Portugal, 2018. [Online]. Available: http://www.pool.ntp.org/zone/pt. [Acedido em 2018]. [8] R. ROSS, “Recommended Security Controls for Federal Information Systems,” NYST - Computer Security Division, USA, 2007. [9] O. Security, “Open Security Architecture,” 2011. [Online]. Available: http://www.opensecurityarchitecture.org. [Acedido em 20 Março 2018]. [10] G. HARRISON, Inside a Cloud, USA: Capitol Records, 2002. [11] C. GIBSON, “Time-Sharing in the IBM System/360: Model 67,” em Sping Joint Computer Conference, 1966. [12] V. TRAVASSOS, “Virtualization Trends Trace Their Origins Back to the Mainframe,” Agosto 2012. [Online]. Available: http://www.ibmsystemsmag.com/mainframe/administrator/Virtualization/history_virtualization/. [13] A. SINGH, “An Introduction to Virtualization,” Janeiro 2004. [Online]. Available: http://www.kernelthread.com/publications/virtualization/. [14] IBM, “IBM SearchManager/370 Client for Windows,” [Online]. Available: http://www-01.ibm.com/common/ssi/cgi-bin/ssialias?infotype=dd&subtype=sm&appname=ShopzSeries&htmlfid=897/ENUS5695-070#Header_6. [15] H. CANDIDO, “História da Virtualização,” 19 Maio 2007. [Online]. Available: https://caiocandido.wordpress.com/2007/05/19/conceitos-de-virtualizacao/. [16] S. CONROY, “History of Virtualization,” 2010. [Online]. Available: http://www.everythingvm.com/content/history-virtualization. [17] V. JOSYULA, “Virtualization,” em Clound Computing, Indianapolis, Cisco Press, 2012. [18] G. PAGE, “Clound Computing,” em Clound Computing, Indianapolis, Cisco Press, 2012. [19] S. SCHUMATE, “Implications of Virtualization - Technical Report,” DELL, 2014. [20] G. POPEK, “Formal Requirements for Virtualization Third Generation Architectures,” ACM, 1974. [21] J. SMITH, “Architectures of Virtual Machines,” IEEE Computer, vol. 38, Maio 2005. [22] J. S. REUBEN, “A Survey on Virtual Machine.,” Helsinki University of Technology, Helsinki, 2007. [23] B. MADDEN, “Hypervisors,” 9 Março 2010. [Online]. Available: http://blog.sharevm.com/2010/03/09/type-1-and-type-2-client-hypervisors. [24] J. A. RIZO, “Emulator,” [Online]. Available: Listing os Virtualization and Remote Control Solutions: Running Windows or Linux Software on a Macintosh and Running Mac OS on other Platforms. [25] R. P. GOLDBERG, “Architectural Principles for Virtual Computer Systems.,” Harvard University Press, 1973. [26] P. COTTON, “Sun x VM,” 2008. [Online]. Available: http://www.sun.com/bigadmin/sundocs/articles/xvmhvsrovw.jsp. [27] N. COCHRANE, “Stacking up the hypervisors,” 2010. [Online]. Available: http://www.crn.com.au/Feature/173728,stacking-up-the-hypervisors.adpx. [28] VMware, “DRS and DPM,” [Online]. Available: http://www.vmware.com/products/drs. [29] VMware, “High availability,” [Online]. Available: http://www.vmware.com/products/high-availability/. [30] J. SANTOS, Artist, Security Challenges with Virtualization. [Art]. FCUL. [31] LANDESK, “Application Virtualization,” 2007. [Online]. Available: http://www.landesk.com/WorkArea/downloadasset.aspx?id=2393.