Proactive Security Analysis of Changes in Virtualized Infrastructures.
Sören BleikertzCarsten VogelThomas GroßSebastian MödersheimPublished in: ACSAC (2015)
Keyphrases
- security analysis
- computing infrastructure
- cloud computing
- smart card
- public key
- security properties
- security requirements
- security model
- image encryption
- high security
- encryption scheme
- authentication protocol
- encryption algorithm
- user authentication
- real time
- authentication scheme
- data management
- private key
- lightweight
- mutual authentication