Towards a Formally Verified Security Monitor for VM-based Confidential Computing.
Wojciech OzgaGuerney D. H. HuntMichael V. LeElaine R. PalmerAvraham ShinnarPublished in: CoRR (2023)
Keyphrases
- statistical databases
- confidential information
- intrusion detection
- sensitive data
- inference control
- access control
- computer security
- information security
- network security
- data security
- security threats
- security policies
- security model
- key management
- security requirements
- security issues
- monitoring system
- data management
- real time
- information assurance
- numerical data
- virtual machine
- feature space
- social networks