Security Limitations of Virtualization and How to Overcome Them (Transcript of Discussion).
Virgil D. GligorPublished in: Security Protocols Workshop (2010)
Keyphrases
- operating system
- information security
- intrusion detection
- network access
- security requirements
- security issues
- single point of failure
- access control
- security policies
- windows xp
- statistical databases
- network security
- cloud computing environment
- security threats
- security problems
- security systems
- computer security
- security mechanisms
- virtual machine
- key management
- security protocols
- cyber security
- sensitive data
- security level
- cloud computing
- wireless networks
- online discussion
- data center
- information systems