– in this example it is
called ubuntu-amd64-alice.xml
– would look like Listing 1.
Listing 1: VM Storage as a Block Device
11%
02.04.2013
of additional authentication factors.
Authentication Methods
Various authentication methods can be categorized into the groups “knowledge,” “possession,” and “biometrics” (Table 1). These groups, also called