“…Also, this mechanism helps to improve availability since in case of attacks against a VM, other VMs are protected by virtualization layer. Moreover, secure key storage 2 Integrity 66,77,83,86,91,93,95,99,108,109,111,116,118,122,123,132,136 3 Confidentiality 63,65,66,71,75,83,86,90,91,93,99,110,112,116,118,120,126 4 Availability 63,66,70,75,76,78,79,81,87,90,91,98,103,104,109,111,…”