Secure yet usable: Protecting servers and Linux containers.
S. BarlevZ. BasilS. KohanimR. PelegS. RegevAlexandra Shulman-PelegPublished in: IBM J. Res. Dev. (2016)
Keyphrases
- operating system
- file system
- unauthorized access
- database applications
- open source
- data center
- security mechanisms
- single point of failure
- data protection
- cryptographic protocols
- linux kernel
- remote server
- lightweight
- access control
- protection mechanisms
- encryption scheme
- key management
- arrival rate
- authentication protocol
- security issues
- wireless networks
- cloud computing
- distributed systems