Virtualization and Cloud Security: Benefits, Caveats, and Future Developments
- 21 October 2014
- book chapter
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableThis publication has 19 references indexed in Scilit:
- Windows Mobile LiveSD ForensicsJournal of Network and Computer Applications, 2013
- A security analysis of amazon's elastic compute cloud servicePublished by Association for Computing Machinery (ACM) ,2012
- Secure and Robust Monitoring of Virtual Machines through Guest-Assisted IntrospectionLecture Notes in Computer Science, 2012
- Towards proactive event-driven computingPublished by Association for Computing Machinery (ACM) ,2011
- Escape from Monkey Island: Evading High-Interaction HoneyclientsLecture Notes in Computer Science, 2011
- A Security Management Architecture for the Protection of Kernel Virtual MachinesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Trusting the cloudACM SIGACT News, 2009
- Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT)Published by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- KvmSecPublished by Association for Computing Machinery (ACM) ,2009
- VM-based Architecture for Network Monitoring and AnalysisPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008