Sign in

EqualVisor: Providing Memory Protection in an Untrusted Commodity Hypervisor.

Liang DengQingkai ZengWeiguang WangYao Liu
Published in: TrustCom (2014)
Keyphrases
  • operating system
  • third party
  • memory requirements
  • memory usage
  • virtual machine
  • neural network
  • privacy preserving
  • network traffic
  • computing power
  • random access
  • network resources
  • memory space