Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security.
Sergey BratusMichael E. LocastoAshwin RamaswamySean W. SmithPublished in: VMSec (2008)
Keyphrases
- access control
- security policies
- security issues
- operating system
- cloud computing environment
- cloud computing
- policy enforcement
- intrusion detection
- event detection
- information security
- virtual machine
- intellectual property protection
- network security
- enterprise network
- security mechanisms
- service management
- data integration
- network access
- disaster recovery
- enterprise wide
- mission critical
- security requirements
- security analysis
- sensitive data
- security management
- temporal information
- database
- smart card
- human activities
- data center