Enforcing Access Controls for the Cryptographic Cloud Service Invocation Based on Virtual Machine Introspection.
Fangjie JiangQuanwei CaiLe GuanJingqiang LinPublished in: ISC (2018)
Keyphrases
- virtual machine
- cloud services
- protection schemes
- operating system
- access control
- computing resources
- web services
- data center
- privacy protection
- smart card
- distributed computing
- computer systems
- virtual memory
- data protection
- security policies
- relational databases
- encryption scheme
- security mechanisms
- role based access control
- cloud computing
- access control policies
- security protocols
- data mining