Justifying Integrity Using a Virtual Machine Verifier.
Joshua SchiffmanThomas MoyerChristopher ShalTrent JaegerPatrick D. McDanielPublished in: ACSAC (2009)
Keyphrases
- virtual machine
- remote attestation
- java card
- operating system
- data center
- computing resources
- distributed computing
- cloud computing environment
- low latency
- multi tasking
- virtual memory
- integrity constraints
- cost effective
- access control
- distributed systems
- low cost
- database systems
- information systems
- machine learning