Virtualization and Hardware-Based Security.
Ronald PerezLeendert van DoornReiner SailerPublished in: IEEE Secur. Priv. (2008)
Keyphrases
- network access
- operating system
- ibm zenterprise
- cloud computing
- low cost
- random number generator
- hardware and software
- network security
- windows xp
- intrusion detection
- security issues
- computer systems
- virtual machine
- information security
- cloud computing environment
- trusted computing
- wireless networks
- computer security
- security policies
- security requirements
- real time
- statistical databases
- application level
- protection schemes
- security analysis
- computing systems
- image processing
- data integrity
- hardware architecture
- key management
- high availability
- sensitive data
- data integration
- access control