Login / Signup

Security Architecture for a Virtual Heterogeneous Machine.

Roger WrightDavid J. ShifflettCynthia E. Irvine
Published in: ACSAC (1998)
Keyphrases
  • security architecture
  • access control
  • security model
  • security policies
  • security mechanisms
  • data integrity
  • simulation platform
  • intrusion detection system
  • insider threat
  • security requirements