메뉴 건너뛰기




Volumn , Issue , 2014, Pages 1004-1009

Virtualization security combining mandatory access control and virtual machine introspection

Author keywords

Access Control; Cloud Computing; Security; Systems Security; Virtual Machine Introspection; Virtual Machines; Virtualization; Virtualization Security

Indexed keywords

CLOUD COMPUTING; DISTRIBUTED COMPUTER SYSTEMS; JAVA PROGRAMMING LANGUAGE; MOBILE SECURITY; VIRTUAL REALITY;

EID: 84946685838     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/UCC.2014.165     Document Type: Conference Paper
Times cited : (22)

References (20)
  • 3
    • 0004200684 scopus 로고
    • Computer security technology planning study
    • J. P. Anderson, "Computer security technology planning study. volume 2," DTIC Document, Tech. Rep., 1972
    • (1972) DTIC Document, Tech. Rep. , vol.2
    • Anderson, J.P.1
  • 9
    • 84882241119 scopus 로고    scopus 로고
    • Design and implementation of linux file mandatory access control
    • Springer
    • L. Tian, X. Rong, and T. Liu, "Design and implementation of linux file mandatory access control," in Network Computing and Information Security. Springer, 2012, pp. 15-22
    • (2012) Network Computing and Information Security , pp. 15-22
    • Tian, L.1    Rong, X.2    Liu, T.3
  • 18
    • 85080362568 scopus 로고    scopus 로고
    • A virtual machine introspection based architecture for intrusion detection
    • T. Garfinkel, M. Rosenblum et al., "A virtual machine introspection based architecture for intrusion detection." in NDSS, vol. 3, 2003, pp. 191-206
    • (2003) NDSS , vol.3 , pp. 191-206
    • Garfinkel, T.1    Rosenblum, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.