Assured cloud computing
Record details
- ISBN: 1119428637
- ISBN: 9781119428633
- ISBN: 1119428491
- ISBN: 9781119428497
- ISBN: 9781119428503
- ISBN: 1119428505
- ISBN: 1119428483
- ISBN: 9781119428480
-
Physical Description:
1 online resource
remote - Edition: First edition.
- Publisher: Hoboken, NJ : IEEE Computer Society, Inc./Wiley, 2018.
Content descriptions
Bibliography, etc. Note: | Includes bibliographical references and index. |
Formatted Contents Note: | 4.5.1 Hypervisor Introspection4.5.1.1 VMI Monitor; 4.5.1.2 VM Suspend Side-Channel; 4.5.1.3 Limitations of Hypervisor Introspection; 4.5.2 Evading VMI with Hypervisor Introspection; 4.5.2.1 Insider Attack Model and Assumptions; 4.5.2.2 Large File Transfer; 4.5.3 Defenses against Hypervisor Introspection; 4.5.3.1 Introducing Noise to VM Clocks; 4.5.3.2 Scheduler-Based Defenses; 4.5.3.3 Randomized Monitoring Interval; 4.5.4 Summary; 4.6 Identifying Compromised Users in Shared Computing Infrastructures; 4.6.1 Target System and Security Data; 4.6.1.1 Data and Alerts. |
Information Relating to Copyright Status: | Copyright © 2018 by John Wiley & Sons 2018 |
Source of Description Note: | Online resource; title from PDF title page (EBSCO, viewed August 14, 2018). |
Search for related items by subject
Genre: | Electronic books. Electronic books. |