Using a proxy for endpoint access control

作者: Rajan Palanivel , Ned Smith , Carl Klotz

DOI:

关键词: GeographyProxy (statistics)NegotiationWorld Wide WebVirtual machineComputer securityAccess controlConnection (mathematics)

摘要: A technique includes providing a virtual machine within first enclave and second enclave. is used as proxy to negotiate connection between the

参考文章(16)
Elias Naji Bayeh, Virtual machine pooling ,(1998)
Ned Smith, Kapil Sood, Jesse Walker, Network access control for many-core systems ,(2006)
Richard James Mazzaferri, Anthony Edward Low, David Neil Robinson, Richard Jason Croft, Bradley J. Pedersen, Methods and systems for providing remote access to a computing environment provided by a virtual machine ,(2007)
Stephen E. Stucka, Thomas M. Ruehle, James R. Carlock, Gerald D. Boldt, Ronald L. Heiney, Virtual socket for JAVA interprocess communication ,(1997)
Girish Kalele, Michael Carl Gorven, Brynmor K B Divey, Christopher Conway Pinkham, Russell Andrew Cloran, Quinton Robin Hoole, Alexandre Hardy, Biljon Willem Robert Van, Virtual computing infrastructure ,(2005)
Thomas R. Markham, Distributed firewall system and method ,(2001)
James J. Spilker, Andy Lee, Jimmy K. Omura, Matthew Rabinowitz, Location identification using broadcast wireless signal signatures ,(2005)