When an authenticated wireless computer loses connectivity to a wireless
access point of a network and roams to another access point, the wireless
computer (e.g., a hypervisor in the computer) determines whether the new
access point is authorized for secure communication and if so, releases
access to secure data on the network through the new access point.