Analysis of the Intel Pentium's ability to support a secure virtual machine monitor
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Semantic remote attestation: a virtual machine directed approach to trusted computing
VM'04 Proceedings of the 3rd conference on Virtual Machine Research And Technology Symposium - Volume 3
The use of hardware virtualization in the context of information security
Programming and Computing Software
Final fantasy: securing on-line gaming with trusted computing
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Virtualization: Issues, security threats, and solutions
ACM Computing Surveys (CSUR)
Security-Preserving Live Migration of Virtual Machines in the Cloud
Journal of Network and Systems Management
Hi-index | 0.00 |