Uses of Hardware Virtualization for Secure and Trusted Computing: A Review.
Xin ZhangYongshu BaiYifan ZhangPublished in: Smart Comput. Rev. (2015)
Keyphrases
- trusted computing
- cloud computing
- computing platform
- computing environments
- remote attestation
- trusted platform module
- distributed computing
- virtual organization
- computer security
- operating system
- data center
- cloud computing environment
- virtual machine
- security issues
- factor authentication
- response time
- data management