First Page | Document Content | |
---|---|---|
Date: 2009-10-05 06:46:18Virtual machines Hypervisor Bell–LaPadula model Hyper-V VM Xen Biba Model Trusted Computer System Evaluation Criteria Covert channel System software Computing Software | Secure Hypervisors Sebastian Vogl Fakult¨Add to Reading ListSource URL: www.sec.in.tum.deDownload Document from Source WebsiteFile Size: 349,61 KBShare Document on Facebook |