Login / Signup
Practical Uses of Virtual Machines for Protection of Sensitive User Data.
Peter C. S. Kwan
Glenn Durfee
Published in:
ISPEC (2007)
Keyphrases
</>
mobile devices
end users
data quality
data sets
data points
database
data collection
data analysis
data sources
computing resources
user input
data processing
virtual machine
data mining techniques
computing platform
user defined
test data
operating system
data warehouse
information systems
real time