Login / Signup
Protecting Critical Files Using Target-Based Virtual Machine Introspection Approach.
Dongyang Zhan
Lin Ye
Binxing Fang
Xiaojiang Du
Zhikai Xu
Published in:
IEICE Trans. Inf. Syst. (2017)
Keyphrases
</>
virtual machine
operating system
data center
computing resources
distributed computing
cloud computing environment
virtual memory
low latency
multi tasking
java card
metadata
file system
remote attestation
data sets
parallel computing
source code
database systems