共 50 条
- [2] Extracting Secrets from Encrypted Virtual Machines [J]. PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), 2019, : 221 - 230
- [4] Security Architecture for Virtual Machines [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PT I: ICA3PP 2011, 2011, 7916 : 218 - +
- [5] Security analysis in the dynamic migration of virtual machines in cloud computing [J]. Shang, Huihua (Shanghuihua@163.com), 2017, Universidad Central de Venezuela (55):
- [6] A security analysis for encrypted database [J]. 2007 International Symposium on Computer Science & Technology, Proceedings, 2007, : 987 - 990
- [7] SEVerity: Code Injection Attacks against Encrypted Virtual Machines [J]. 2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2021), 2021, : 444 - 455
- [8] Live Migration of Operating System Containers in Encrypted Virtual Machines [J]. PROCEEDINGS OF THE 2021 CLOUD COMPUTING SECURITY WORKSHOP, CCSW 2021, 2021, : 125 - 137
- [9] The Application of Virtual Machines on System Security [J]. FOURTH CHINAGRID ANNUAL CONFERENCE, PROCEEDINGS, 2009, : 222 - 229
- [10] Integrated Security Architecture for Virtual Machines [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 : 140 - 153