Using Virtual Machine Security to Reinforce Components Constraints | IEEE Conference Publication | IEEE Xplore