When Virtual Is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments.
Tal GarfinkelMendel RosenblumPublished in: HotOS (2005)
Keyphrases
- computing environments
- virtual machine
- cloud computing environment
- remote attestation
- trusted computing
- java card
- operating system
- data center
- computing platform
- computing resources
- mobile computing
- windows xp
- mobile environments
- virtual memory
- distributed computing
- cloud computing
- grid computing
- security policies
- information security
- security issues
- access control
- network access
- low latency
- network security
- intrusion detection
- mobile devices
- computer security
- security requirements
- smart card
- mobile agents
- multi tasking
- java bytecode