Login / Signup
Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security.
Sergey Bratus
Michael E. Locasto
Ashwin Ramaswamy
Sean W. Smith
Published in:
VMSec (2008)
Keyphrases
</>
access control
security policies
security issues
operating system
cloud computing environment
cloud computing
policy enforcement
intrusion detection
event detection
information security
virtual machine
intellectual property protection
network security
enterprise network
security mechanisms
service management
data integration
network access
disaster recovery
enterprise wide
mission critical
security requirements
security analysis
sensitive data
security management
temporal information
database
smart card
human activities
data center