31
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems

      ,
      ACM Computing Surveys
      Association for Computing Machinery (ACM)

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references116

          • Record: found
          • Abstract: not found
          • Article: not found

          Basic concepts and taxonomy of dependable and secure computing

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Xen and the art of virtualization

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              Innovative instructions and software model for isolated execution

                Bookmark

                Author and article information

                Journal
                ACM Computing Surveys
                ACM Comput. Surv.
                Association for Computing Machinery (ACM)
                03600300
                February 08 2016
                February 08 2016
                : 48
                : 3
                : 1-38
                Article
                10.1145/2856126
                1f312f3e-929d-4c50-b55f-5ec426343f16
                © 2016

                http://www.acm.org/publications/policies/copyright_policy#Background

                History

                Comments

                Comment on this article