Kriativ-techVolume 1, Issue 1, March 2018, Pages: xxxReceived: Nov. 28, 2017;Accepted: Dec. 8, 2017;Published: Feb. 24, 2018

Authors

Pedro Ramos BrandãoProfessor Coordenador do ISTEC, Departamento de Estudos e Investigação em Tecnologias de Informação e Sociedade - ISTEC, Investigador da Universidade de Évora – CIDEHUS

Media

PDF

To cite this article

Pedro Ramos Brandão, Virtualização: fundamentosDOI: 10.31112/kriativ-tech-2018-01-01

Abstract

We will briefly review the historical context of the concept of virtualization. We'll try to explain the key facts that drive solution providers to virtualization, enumerate the various types of virtualization, define their components, and discuss security issues that are directly related to virtualization.

Keywords

Cloud Computing, Security, ISO 27001, ISO 27002, Security Policies.

References

[1]G. MELL, “The NIST Definition of Cloud Computing version 15,” National Institute of Standars and technology, Information Technology Laboratory, USA, 2009.
[2]V. WINKLER, Securing The Cloud, USA: Syngress, 2011.
[3]H. SWANSON, “NIST Special Publication 800-18 - Guideline for Developing Security Plans for Federal Information Systems,” US Department of Commerce, USA, 2006.
[4]E. SIRON, Hyper-V Security, USA: PACKT, 2014.
[5]ISO-27001, “ISO 27001,” [Online]. Available: https://www.27001.pt.
[6]ISO-27002, “ISO 27002,” [Online]. Available: http://www.iso27001security.com/html/27002.html.
[7]N. POOL, “NTP POOL PROJECT,” NTP Portugal, 2018. [Online]. Available: http://www.pool.ntp.org/zone/pt. [Acedido em 2018].
[8]R. ROSS, “Recommended Security Controls for Federal Information Systems,” NYST - Computer Security Division, USA, 2007.
[9]O. Security, “Open Security Architecture,” 2011. [Online]. Available: http://www.opensecurityarchitecture.org. [Acedido em 20 Março 2018].
[10]G. HARRISON, Inside a Cloud, USA: Capitol Records, 2002.
[11]C. GIBSON, “Time-Sharing in the IBM System/360: Model 67,” em Sping Joint Computer Conference, 1966.
[12]V. TRAVASSOS, “Virtualization Trends Trace Their Origins Back to the Mainframe,” Agosto 2012. [Online]. Available: http://www.ibmsystemsmag.com/mainframe/administrator/Virtualization/history_virtualization/.
[13]A. SINGH, “An Introduction to Virtualization,” Janeiro 2004. [Online]. Available: http://www.kernelthread.com/publications/virtualization/.
[14]IBM, “IBM SearchManager/370 Client for Windows,” [Online]. Available: http://www-01.ibm.com/common/ssi/cgi-bin/ssialias?infotype=dd&subtype=sm&appname=ShopzSeries&htmlfid=897/ENUS5695-070#Header_6.
[15]H. CANDIDO, “História da Virtualização,” 19 Maio 2007. [Online]. Available: https://caiocandido.wordpress.com/2007/05/19/conceitos-de-virtualizacao/.
[16]S. CONROY, “History of Virtualization,” 2010. [Online]. Available: http://www.everythingvm.com/content/history-virtualization.
[17]V. JOSYULA, “Virtualization,” em Clound Computing, Indianapolis, Cisco Press, 2012.
[18]G. PAGE, “Clound Computing,” em Clound Computing, Indianapolis, Cisco Press, 2012.
[19]S. SCHUMATE, “Implications of Virtualization - Technical Report,” DELL, 2014.
[20]G. POPEK, “Formal Requirements for Virtualization Third Generation Architectures,” ACM, 1974.
[21]J. SMITH, “Architectures of Virtual Machines,” IEEE Computer, vol. 38, Maio 2005.
[22]J. S. REUBEN, “A Survey on Virtual Machine.,” Helsinki University of Technology, Helsinki, 2007.
[23]B. MADDEN, “Hypervisors,” 9 Março 2010. [Online]. Available: http://blog.sharevm.com/2010/03/09/type-1-and-type-2-client-hypervisors.
[24]J. A. RIZO, “Emulator,” [Online]. Available: Listing os Virtualization and Remote Control Solutions: Running Windows or Linux Software on a Macintosh and Running Mac OS on other Platforms.
[25]R. P. GOLDBERG, “Architectural Principles for Virtual Computer Systems.,” Harvard University Press, 1973.
[26]P. COTTON, “Sun x VM,” 2008. [Online]. Available: http://www.sun.com/bigadmin/sundocs/articles/xvmhvsrovw.jsp.
[27]N. COCHRANE, “Stacking up the hypervisors,” 2010. [Online]. Available: http://www.crn.com.au/Feature/173728,stacking-up-the-hypervisors.adpx.
[28]VMware, “DRS and DPM,” [Online]. Available: http://www.vmware.com/products/drs.
[29]VMware, “High availability,” [Online]. Available: http://www.vmware.com/products/high-availability/.
[30]J. SANTOS, Artist, Security Challenges with Virtualization. [Art]. FCUL.
[31]LANDESK, “Application Virtualization,” 2007. [Online]. Available: http://www.landesk.com/WorkArea/downloadasset.aspx?id=2393.