Secure live virtual machine migration through runtime monitors.
Ahmed M. MahfouzMd Lutfar RahmanSajjan G. ShivaPublished in: IC3 (2017)
Keyphrases
- virtual machine
- remote attestation
- method invocation
- operating system
- java card
- computing resources
- data center
- distributed computing
- multi tasking
- low latency
- security issues
- security requirements
- virtual memory
- java bytecode
- cloud computing environment
- runtime environment
- computer systems
- cloud computing
- java virtual machine
- security mechanisms
- real time