T. , L. Vinh, and S. , Bouzefrane -Trusted Platforms to secure Mobile Cloud Computing, The 16th IEEE International Conference, pp.1096-1103, 2014.

G. J. Popek and R. P. Goldberg, Formal requirements for virtualizable third generation architectures, Commun. ACM, vol.17, issue.7, 1974.

F. Rodriguez-haro, The 2012 Iberoamerican Conference on Electronics. Engineering and Computer Science -A summary of virtualization techniques

J. Chiang, Optimization Techniques for Memory Virtualization based Resource Management, 2012.

R. Perez, R. Sailer, and L. , van Doorn, and others, vTPM: virtualizing the trusted platform module, Proc. 15th Conf. on USENIX Security Symposium, pp.305-320, 2006.

P. England and J. Loeser, Para-Virtualized TPM Sharing, Trusted Computing-Challenges and Applications, pp.119-132, 2008.
DOI : 10.1007/978-3-540-68979-9_9

M. Strasser and H. Stamer, A Software-Based Trusted Platform Module Emulator, Trusted Computing-Challenges and Applications, pp.33-47, 2008.
DOI : 10.1007/978-3-540-68979-9_3

B. Danev, R. J. Masti, G. O. Karame, and S. Capkun, Enabling secure VM-vTPM migration in private clouds, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, pp.187-196, 2011.
DOI : 10.1145/2076732.2076759

J. Cucurull and S. Guasch, Virtual TPM for a secure cloud: fallacy or reality?, RECSI 2014, pp.2-5, 2014.

W. Felter, A. Ferreira, R. Rajamony, and J. Rubio, An Updated Performance Comparison of Virtual Machines and Linux Containers (IBM report)

S. Sharathvenkatesha, S. Sadhu, and . Kintali, Survey of Virtual Machine Migration Techniques (VM migration

Y. Bashir-aliyu, Joshua Abah Mitigating Security Threats in Virtualized Environments, IJCSNS International Journal of Computer Science and Network Security, vol.161, 2016.

A. Burtsev, D. Johnson, M. Hibler, E. Eide, and J. Regehr, Abstractions for Practical Virtual Machine Replay, Proceedings of the 12th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE'16), 2016.

D. Paul, Rowe Principles of Layered Attestation, 2016.

D. Contractor, D. Patel, and S. Patel, Trusted Heartbeat Framework for Cloud Computing, Journal of Information Security, vol.07, issue.03, pp.103-111, 2016.
DOI : 10.4236/jis.2016.73007

C. Mastroianni, M. Meo, and G. Papuzzo, Probabilistic Consolidation of Virtual Machines in Self-Organizing Cloud Data Centers, IEEE Transactions on Cloud Computing, vol.1, issue.2, pp.215-228
DOI : 10.1109/TCC.2013.17

R. Monil, VM consolidation approach based on heuristics, fuzzy logic, and migration control Journal of Cloud Computing: Advances, Systems and Applications, 2016.

L. Polkowski, Rough Sets: Mathematical Foundations
DOI : 10.1007/978-3-7908-1776-8