Practical Uses of Virtual Machines for Protection of Sensitive User Data

Peter C. S. Kwan, Glenn Durfee. Practical Uses of Virtual Machines for Protection of Sensitive User Data. In Ed Dawson, Duncan S. Wong, editors, Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings. Volume 4464 of Lecture Notes in Computer Science, pages 145-161, Springer, 2007. [doi]

@inproceedings{KwanD07,
  title = {Practical Uses of Virtual Machines for Protection of Sensitive User Data},
  author = {Peter C. S. Kwan and Glenn Durfee},
  year = {2007},
  doi = {10.1007/978-3-540-72163-5_13},
  url = {http://dx.doi.org/10.1007/978-3-540-72163-5_13},
  tags = {data-flow, C++},
  researchr = {https://researchr.org/publication/KwanD07},
  cites = {0},
  citedby = {0},
  pages = {145-161},
  booktitle = {Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings},
  editor = {Ed Dawson and Duncan S. Wong},
  volume = {4464},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-540-72159-8},
}