Virtualized hosting: Devising a security policy through log analysis | IEEE Conference Publication | IEEE Xplore