Login / Signup
Cloud Computing: Insider Attacks on Virtual Machines during Migration.
Adrian J. Duncan
Sadie Creese
Michael Goldsmith
Jamie S. Quinton
Published in:
TrustCom/ISPA/IUCC (2013)
Keyphrases
</>
insider attacks
virtual machine
cloud computing
data center
cloud computing environment
computing resources
cloud services
distributed computing
service providers
data management
operating system
network access
cryptographic protocols
business models
database
data sets
life cycle
security issues