Eliminating the hypervisor attack surface for a more secure cloud.
Jakub SzeferEric KellerRuby B. LeeJennifer RexfordPublished in: CCS (2011)
Keyphrases
- virtual machine
- key exchange protocol
- security measures
- authentication protocol
- authentication mechanism
- operating system
- cloud computing
- three dimensional
- block cipher
- data center
- security issues
- information leakage
- lightweight
- cloud storage
- sensitive data
- data encryption
- security management
- cryptographic protocols
- network resources
- countermeasures
- range data
- smart card
- peer to peer