Providing secure services for a virtual infrastructure
ACM SIGOPS Operating Systems Review
LaLa: a late launch application
Proceedings of the 2009 ACM workshop on Scalable trusted computing
A xen-based data sharing & access controlling method
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
Dynamic enforcement of platform integrity
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
acTvSM: a dynamic virtualization platform for enforcement of application integrity
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Hi-index | 0.00 |
Through the practice of information security, people have realized that the causation of security mainly comes from microcomputer terminal. To ensure the source security of microcomputer terminal, the solution must synthetically integrate different security ...