A Uniquified Virtualization Approach to Hardware Security.
Greg StittRobert KaramKai YangSwarup BhuniaPublished in: IEEE Embed. Syst. Lett. (2017)
Keyphrases
- network access
- ibm zenterprise
- operating system
- low cost
- random number generator
- cloud computing
- windows xp
- information security
- security issues
- real time
- computer security
- computing systems
- trusted computing
- virtual machine
- intrusion detection
- cloud computing environment
- network security
- computer systems
- security policies
- access control
- distributed computing
- statistical databases
- protection scheme
- wireless networks
- massively parallel
- security mechanisms
- data acquisition
- input output
- high availability
- embedded systems
- application level
- distributed systems