This article presented a set of pages to work with virtualmachine images, running instances of those images, and the key pairs and security groups that allow you to manage them.
本文呈现一组页面以处理虚拟机映像,映像的运行实例,以及允许您管理实例的密匙对和安全组。
2
The security and administrative advantages are significant; for instance, there's simply no way for an attacker who's penetrated one virtualmachine to affect another.
安全性和优势是很显著的;例如,渗透到一台虚拟机的攻击者根本没有办法影响另一台虚拟机。
3
In this paper, we identify eight application-level security architectures based on the following three elements: VirtualMachine, Control Set, and Distribution Style.