Security Challenges on the Clone, Snapshot, Migration and Rollback of Xen Based Computing Environments.
Lei YuChuliang WengMinglu LiYuan LuoPublished in: ChinaGrid (2010)
Keyphrases
- computing environments
- trusted computing
- security problems
- security concerns
- security issues
- service discovery
- mobile environments
- information security
- mobile computing
- pervasive computing
- grid computing
- security and privacy issues
- low bandwidth
- security requirements
- computer security
- pervasive computing environments
- network security
- intrusion detection
- computing platform
- mobile agents
- security policies
- wireless devices
- access control
- cooperative