Security Limitations of Virtualization and How to Overcome Them.
Virgil D. GligorPublished in: Security Protocols Workshop (2010)
Keyphrases
- information security
- cloud computing environment
- cloud computing
- security policies
- security requirements
- operating system
- virtual machine
- security systems
- security issues
- network access
- network security
- security mechanisms
- single point of failure
- security threats
- security problems
- security level
- statistical databases
- intrusion detection
- key management
- data center
- wireless sensor networks
- data mining
- computer security
- distributed databases
- access control
- information assurance