Login / Signup
Security Architecture for a Virtual Heterogeneous Machine.
Roger Wright
David J. Shifflett
Cynthia E. Irvine
Published in:
ACSAC (1998)
Keyphrases
</>
security architecture
access control
security model
security policies
security mechanisms
data integrity
simulation platform
intrusion detection system
insider threat
security requirements