Improving Users' Isolation in IaaS: Virtual Machine Placement with Security Constraints.
Eddy CaronJonathan Rouzaud-CornabasPublished in: IEEE CLOUD (2014)
Keyphrases
- virtual machine
- java card
- data center
- cloud computing environment
- cloud services
- cloud computing
- remote attestation
- operating system
- computing resources
- windows xp
- end users
- user interface
- distributed computing
- network access
- network security
- personal data
- virtual memory
- security requirements
- information security
- virtual machine monitor
- security policies
- java virtual machine
- security issues
- real time
- data processing
- data streams
- data mining