[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Virtualization and Hardware-Based Security

Published: 01 September 2008 Publication History

Abstract

Hypervisors allow virtualization at the hardware level. These technologies have security-related strengths as well as weaknesses. The authors examine emerging hardware and software virtualization technologies in the context of modern computing environments and requirements.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Security and Privacy
IEEE Security and Privacy  Volume 6, Issue 5
September 2008
82 pages

Publisher

IEEE Educational Activities Department

United States

Publication History

Published: 01 September 2008

Author Tags

  1. hardware-based security
  2. hypervisors
  3. virtualization

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Next-Generation Optimization Models and Algorithms in Cloud and Fog Computing Virtualization SecurityScientific Programming10.1155/2022/24192912022Online publication date: 1-Jan-2022
  • (2013)VirtualizationACM Computing Surveys10.1145/2431211.243121645:2(1-39)Online publication date: 12-Mar-2013
  • (2012)Identifying critical factors for corporate implementing virtualization technologyComputers in Human Behavior10.1016/j.chb.2012.06.03228:6(2244-2257)Online publication date: 1-Nov-2012
  • (2010)Towards a data-centric view of cloud securityProceedings of the second international workshop on Cloud data management10.1145/1871929.1871934(25-32)Online publication date: 30-Oct-2010
  • (2009)TimeCapsuleProceedings of the 1st ACM workshop on Virtual machine security10.1145/1655148.1655152(23-32)Online publication date: 9-Nov-2009
  • (2009)VMFenceProceedings of the 3rd International Conference on Ubiquitous Information Management and Communication10.1145/1516241.1516310(391-399)Online publication date: 15-Feb-2009

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media