On the limits of hypervisor- and virtual machine monitor-based isolation

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

In the past few years, there has been a lot of different attempts to build trusted platforms allowing users to access sensitive and non-sensitive data in a compartmentalized way, i.e., such that applications dealing with sensitive data are fully isolated from those dealing only with public data.

Original languageEnglish
Title of host publicationInformation Security and Cryptography
PublisherSpringer International Publishing
Pages349-366
Number of pages18
Edition9783642143120
DOIs
Publication statusPublished - 1 Jan 2010
Externally publishedYes

Publication series

NameInformation Security and Cryptography
Number9783642143120
Volume0
ISSN (Print)1619-7100
ISSN (Electronic)2197-845X

Fingerprint

Dive into the research topics of 'On the limits of hypervisor- and virtual machine monitor-based isolation'. Together they form a unique fingerprint.

Cite this