Flexible security configuration for virtual machines.
Sandra Julieta RuedaYogesh SreenivasanTrent JaegerPublished in: CSAW (2008)
Keyphrases
- virtual machine
- java card
- cloud computing environment
- windows xp
- operating system
- application level
- network access
- data center
- computing resources
- low latency
- distributed computing
- intrusion detection
- access control
- cloud computing
- security requirements
- cloud services
- information security
- network security
- byte code
- security policies
- security protocols
- data mining techniques
- data sources
- information systems
- real time
- database