{"id":"https://openalex.org/W1631564704","doi":"https://doi.org/10.1109/icccn.2015.7288394","title":"Detection of Service Level Agreement (SLA) Violation in Memory Management in Virtual Machines","display_name":"Detection of Service Level Agreement (SLA) Violation in Memory Management in Virtual Machines","publication_year":2015,"publication_date":"2015-08-01","ids":{"openalex":"https://openalex.org/W1631564704","doi":"https://doi.org/10.1109/icccn.2015.7288394","mag":"1631564704"},"language":"en","primary_location":{"id":"doi:10.1109/icccn.2015.7288394","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2015.7288394","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111954056","display_name":"Xiongwei Xie","orcid":null},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]},{"id":"https://openalex.org/I2800200528","display_name":"Charlotte School of Law","ror":"https://ror.org/00e0p8s95","country_code":"US","type":"education","lineage":["https://openalex.org/I2800200528"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xiongwei Xie","raw_affiliation_strings":["Dept. of Software and Information System UNC Charlotte Charlotte, NC","[Department of Software and Information Systems, UNC Charlotte, Charlotte, NC, USA]"],"affiliations":[{"raw_affiliation_string":"Dept. of Software and Information System UNC Charlotte Charlotte, NC","institution_ids":["https://openalex.org/I102149020","https://openalex.org/I2800200528"]},{"raw_affiliation_string":"[Department of Software and Information Systems, UNC Charlotte, Charlotte, NC, USA]","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110551419","display_name":"Weichao Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I2800200528","display_name":"Charlotte School of Law","ror":"https://ror.org/00e0p8s95","country_code":"US","type":"education","lineage":["https://openalex.org/I2800200528"]},{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Weichao Wang","raw_affiliation_strings":["Dept. of Software and Information System UNC Charlotte Charlotte, NC","[Department of Software and Information Systems, UNC Charlotte, Charlotte, NC, USA]"],"affiliations":[{"raw_affiliation_string":"Dept. of Software and Information System UNC Charlotte Charlotte, NC","institution_ids":["https://openalex.org/I102149020","https://openalex.org/I2800200528"]},{"raw_affiliation_string":"[Department of Software and Information Systems, UNC Charlotte, Charlotte, NC, USA]","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058672307","display_name":"Tuanfa Qin","orcid":"https://orcid.org/0000-0002-4014-0396"},"institutions":[{"id":"https://openalex.org/I150807315","display_name":"Guangxi University","ror":"https://ror.org/02c9qn167","country_code":"CN","type":"education","lineage":["https://openalex.org/I150807315"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tuanfa Qin","raw_affiliation_strings":["School of Computer and Electronic Information, Guangxi University, Nanning, Guangxi, China","Sch. of Comput. & Electron. Inf., Guangxi Univ., Nanning, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Electronic Information, Guangxi University, Nanning, Guangxi, China","institution_ids":["https://openalex.org/I150807315"]},{"raw_affiliation_string":"Sch. of Comput. & Electron. Inf., Guangxi Univ., Nanning, China","institution_ids":["https://openalex.org/I150807315"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5111954056"],"corresponding_institution_ids":["https://openalex.org/I102149020","https://openalex.org/I2800200528"],"apc_list":null,"apc_paid":null,"fwci":0.8629,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.81521015,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hypervisor","display_name":"Hypervisor","score":0.8878687620162964},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8617883920669556},{"id":"https://openalex.org/keywords/service-level-agreement","display_name":"Service-level agreement","score":0.6806524991989136},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6472381353378296},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.6390057802200317},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5386258363723755},{"id":"https://openalex.org/keywords/data-deduplication","display_name":"Data deduplication","score":0.4959007203578949},{"id":"https://openalex.org/keywords/service-level","display_name":"Service level","score":0.46167492866516113},{"id":"https://openalex.org/keywords/temporal-isolation-among-virtual-machines","display_name":"Temporal isolation among virtual machines","score":0.4489193260669708},{"id":"https://openalex.org/keywords/semantic-gap","display_name":"Semantic gap","score":0.4265632629394531},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39730751514434814},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.34570151567459106},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.32768362760543823}],"concepts":[{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.8878687620162964},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8617883920669556},{"id":"https://openalex.org/C2778160497","wikidata":"https://www.wikidata.org/wiki/Q869830","display_name":"Service-level agreement","level":3,"score":0.6806524991989136},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6472381353378296},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.6390057802200317},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5386258363723755},{"id":"https://openalex.org/C32587265","wikidata":"https://www.wikidata.org/wiki/Q1182260","display_name":"Data deduplication","level":2,"score":0.4959007203578949},{"id":"https://openalex.org/C181889124","wikidata":"https://www.wikidata.org/wiki/Q380204","display_name":"Service level","level":2,"score":0.46167492866516113},{"id":"https://openalex.org/C142355369","wikidata":"https://www.wikidata.org/wiki/Q7698919","display_name":"Temporal isolation among virtual machines","level":4,"score":0.4489193260669708},{"id":"https://openalex.org/C86034646","wikidata":"https://www.wikidata.org/wiki/Q474311","display_name":"Semantic gap","level":4,"score":0.4265632629394531},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39730751514434814},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34570151567459106},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.32768362760543823},{"id":"https://openalex.org/C1667742","wikidata":"https://www.wikidata.org/wiki/Q10927554","display_name":"Image retrieval","level":3,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccn.2015.7288394","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2015.7288394","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.49000000953674316,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W61998585","https://openalex.org/W64002909","https://openalex.org/W157845512","https://openalex.org/W410165944","https://openalex.org/W1489468372","https://openalex.org/W1495607331","https://openalex.org/W1532284137","https://openalex.org/W1979711747","https://openalex.org/W1985994373","https://openalex.org/W1992291252","https://openalex.org/W2012546482","https://openalex.org/W2013592197","https://openalex.org/W2024109642","https://openalex.org/W2030481825","https://openalex.org/W2037322308","https://openalex.org/W2058189720","https://openalex.org/W2074724693","https://openalex.org/W2097718182","https://openalex.org/W2098522719","https://openalex.org/W2103289002","https://openalex.org/W2110329234","https://openalex.org/W2110363919","https://openalex.org/W2112731379","https://openalex.org/W2119028650","https://openalex.org/W2124585980","https://openalex.org/W2128686420","https://openalex.org/W2130790002","https://openalex.org/W2132204639","https://openalex.org/W2152652423","https://openalex.org/W2162055502","https://openalex.org/W2164185171","https://openalex.org/W2168112441","https://openalex.org/W2169757402","https://openalex.org/W2171863291","https://openalex.org/W2188774998","https://openalex.org/W6606482822","https://openalex.org/W6682813255"],"related_works":["https://openalex.org/W2019731328","https://openalex.org/W1903860135","https://openalex.org/W647959906","https://openalex.org/W2777473589","https://openalex.org/W2510643373","https://openalex.org/W2957116650","https://openalex.org/W19788882","https://openalex.org/W2211851094","https://openalex.org/W3209105150","https://openalex.org/W2118422164"],"abstract_inverted_index":{"In":[0,70,147],"cloud":[1,18],"computing,":[2],"quality":[3],"of":[4,40,81,93,99,129,155],"services":[5],"is":[6],"often":[7],"enforced":[8],"through":[9],"Service":[10],"Level":[11],"Agreement":[12],"(SLA)":[13],"between":[14],"end":[15],"users":[16],"and":[17,97,126],"providers.":[19],"While":[20],"SLAs":[21,42,54],"on":[22,87],"hardware":[23],"resources":[24],"such":[25],"as":[26],"CPU":[27],"cycles":[28],"or":[29,117,153,175],"bandwidth":[30],"can":[31,67,158,180,209],"be":[32,63,68,137,159],"monitored":[33],"by":[34,143,189],"low":[35],"layer":[36],"sensors,":[37],"the":[38,100,106,119,127,144,173,190,207,212],"enforcement":[39],"security":[41,53,82],"stays":[43],"a":[44,94],"very":[45],"challenging":[46],"problem.":[47],"Several":[48],"high":[49],"level":[50],"architectures":[51],"for":[52],"have":[55,122],"been":[56,123],"proposed.":[57],"However,":[58],"details":[59],"still":[60],"need":[61,169],"to":[62,75,78,90,113,131,139,162],"filled":[64],"before":[65],"they":[66,186],"deployed.":[69],"this":[71,148],"paper,":[72],"we":[73,85,111],"propose":[74],"design":[76],"mechanisms":[77,166],"detect":[79,181,211],"violations":[80,183,213],"SLAs.":[83],"Specifically,":[84],"focus":[86],"unauthorized":[88,150],"accesses":[89,130,152],"memory":[91,101,108,120,151],"pages":[92,121],"virtual":[95,200],"machine":[96],"violation":[98,154],"deduplication":[102,156],"policies.":[103],"Through":[104],"measuring":[105],"accumulated":[107],"access":[109,140],"latency,":[110],"try":[112],"derive":[114],"out":[115,125],"whether":[116],"not":[118,168],"swapped":[124],"order":[128],"them.":[132],"These":[133],"events":[134],"will":[135],"then":[136],"compared":[138],"commands":[141],"issued":[142],"local":[145],"VM.":[146],"way,":[149],"policies":[157],"detected.":[160],"Compared":[161],"existing":[163],"approaches,":[164],"our":[165,194],"do":[167],"explicit":[170],"help":[171],"from":[172],"hypervisor":[174],"third":[176],"parties.":[177],"Therefore,":[178],"it":[179],"SLA":[182],"even":[184],"when":[185],"are":[187],"initiated":[188],"hypervisor.":[191],"We":[192],"implement":[193],"approaches":[195],"under":[196],"VMWare":[197],"with":[198,214],"Windows":[199],"machines.":[201],"Our":[202],"experiment":[203],"results":[204],"show":[205],"that":[206],"VM":[208],"effectively":[210],"small":[215],"increases":[216],"in":[217],"overhead.":[218]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
