What Virtualization Can Do for Security.
Tal GarfinkelAndrew WarfieldPublished in: login Usenix Mag. (2007)
Keyphrases
- cloud computing environment
- information security
- network security
- intrusion detection
- security requirements
- virtual machine
- access control
- cloud computing
- security level
- security issues
- network access
- database
- security threats
- statistical databases
- operating system
- network management
- load balancing
- functional requirements
- key management
- security problems
- anomaly detection
- data warehouse
- databases