Establishing secure computing devices for virtualization and administration

作者: Ramesh Chinta , Mohamed Rouatbi , Venkata K. Anumalasetty , Karthik Jaganathan , Scott A. Field

DOI:

关键词:

摘要: Embodiments are directed to establishing a secure connection between computing systems and providing computer system virtualization on device. In one scenario, receives request that at least specified function be initiated. The includes user credentials device claim identifies the authenticates using received determines, based claim, is an approved has been initiate performance of function. Then, upon determining authenticated function, initiates

参考文章(17)
Jonghoon Shim, 오민진, Hyoungjun Park, 심종훈, 김종유, 박형준, Minjin Oh, Jongyu Kim, Terminal management system and method for managing a terminal ,(2012)
Yaron Revah, Efri Zeidner, Shemer Schwartz, Ofir Zohar, System and method for mirroring data ,(2006)
Amit Dang, Sudeep Das, Jayasankar Divakarla, Praneet Khare, Alok Shukla, System and method for whitelisting applications in a mobile network environment ,(2012)
Daniel Faltyn, Andrew J.R. Smith, Secure mobile framework ,(2013)
Thorsten von Eicken, Jose Maria Blanquer Gonzalez, Raphael George Jacques Simon, Systems and methods for associating a virtual machine with an access control right ,(2013)
Sushil Jajodia, Jiang Wang, Anup K. Ghosh, Yih Huang, On-demand disposable virtual work system ,(2008)
Alok Tripathi, Abhinav Mishra, Cloud computing security considerations international conference on signal processing. pp. 1- 5 ,(2011) , 10.1109/ICSPCC.2011.6061557