Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
15
views
14
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,995
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Data and Applications Security and Privacy XXVI
Improving Virtualization Security by Splitting Hypervisor into Smaller Components
other
Author(s):
Wuqiong Pan
,
Yulong Zhang
,
Meng Yu
,
Jiwu Jing
Publication date
(Print):
2012
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Security and Safety (S&S)
Most cited references
14
Record
: found
Abstract
: not found
Conference Proceedings
: not found
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
Zhi Wang
,
Xuxian Jiang
(2010)
0
comments
Cited
32
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Eliminating the hypervisor attack surface for a more secure cloud
Eric J. Keller
,
Jakub Szefer
,
Ruby Lee
…
(2011)
0
comments
Cited
20
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
CloudVisor
Haibo Chen
,
Jin Xi Chen
,
Fengzhe Zhang
…
(2011)
0
comments
Cited
15
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2012
Pages
: 298-313
DOI:
10.1007/978-3-642-31540-4_23
SO-VID:
f256c971-a8a6-48c5-b633-928e8b679fe6
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Logics for Security and Privacy
pp. 8
A User-to-User Relationship-Based Access Control Model for Online Social Networks
pp. 25
Automated and Efficient Analysis of Role-Based Access Control with Attributes
pp. 41
A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC
pp. 56
Signature-Based Inference-Usability Confinement for Relational Databases under Functional and Join Dependencies
pp. 74
Privacy Consensus in Anonymization Systems via Game Theory
pp. 90
Uniform Obfuscation for Location Privacy
pp. 106
Security Vulnerabilities of User Authentication Scheme Using Smart Card
pp. 114
Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards
pp. 122
A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard
pp. 129
Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data
pp. 145
Security Limitations of Using Secret Sharing for Data Outsourcing
pp. 161
Privacy-Preserving Subgraph Discovery
pp. 177
Decentralized Semantic Threat Graphs
pp. 193
Code Type Revealing Using Experiments Framework
pp. 207
From MDM to DB2: A Case Study of Security Enforcement Migration
pp. 223
XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks
pp. 239
Randomizing Smartphone Malware Profiles against Statistical Mining Techniques
pp. 255
Layered Security Architecture for Masquerade Attack Detection
pp. 263
k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing
pp. 274
Reconstruction Attack through Classifier Analysis
pp. 282
Distributed Data Federation without Disclosure of User Existence
pp. 298
Improving Virtualization Security by Splitting Hypervisor into Smaller Components
pp. 314
Enforcing Subscription-Based Authorization Policies in Cloud Scenarios
Similar content
1,995
Towards a TrustZone-Assisted Hypervisor for Real-Time Embedded Systems
Authors:
Sandro Pinto
,
Jorge Pereira
,
Tiago Araújo Gomes
…
Architectural support for hypervisor-secure virtualization
Authors:
Jakub Szefer
,
Ruby B. Lee
On Placement of Hypervisors and Controllers in Virtualized Software Defined Network
Authors:
Bala Prakasa Rao Killi
,
Seela Veerabhadreswara Rao
See all similar