Multi-tiered Security Architecture for ARM via the Virtualization and Security Extensions.
Tamas K. LengyelThomas KittelJonas PfohClaudia EckertPublished in: DEXA Workshops (2014)
Keyphrases
- security architecture
- multi tiered
- access control
- security policies
- security model
- security mechanisms
- operating system
- data integrity
- business processes
- multi tier
- file system
- business applications
- simulation platform
- intrusion detection system
- security requirements
- security issues
- database
- network management
- security analysis
- distributed databases
- cloud computing
- web services
- databases
- public key