Fast switch into a trustworthy virtual machine for running security-sensitive applications.
Adrian PopAdrian ColesaAndrei LutasAlexandru GurzouSándor LukácsRaul TosaDaniel TiclePublished in: AQTR (2018)
Keyphrases
- virtual machine
- windows xp
- operating system
- java card
- remote attestation
- cloud computing environment
- data center
- computing resources
- low latency
- distributed computing
- network access
- high speed
- security requirements
- cloud services
- virtual machine monitor
- trust management
- security protocols
- information security
- security mechanisms
- network security
- access control
- security issues
- virtual memory
- multi tasking
- computer security
- cloud computing
- data mining
- databases
- data sets