Results 61 to 70 of about 13,965 (202)
Grid computing is an emerging technology that enabled the heterogeneous collection of data and provisioning of services to the users. Due to the high amount of incoming heterogeneous request, grid computing needs an efficient scheduling to reduce execution time and satisfy service level agreement (SLA) and quality of service (QoS) requirements.
Gangasandra Mahadevaiah Kiran +1 more
wiley +1 more source
HyperWallet: cryptocurrency wallet as a secure hypervisor-based application
We present VirtSecIO, a hypervisor-based platform for executing secure modules. VirtSecIO provides the modules with secure paths to peripheral devices, which can be shared between the modules and the operating system.
Nezer Jacob Zaidenberg +1 more
doaj +1 more source
Toward the Verification of a Simple Hypervisor [PDF]
Virtualization promises significant benefits in security, efficiency, dependability, and cost. Achieving these benefits depends upon the reliability of the underlying virtual machine monitors (hypervisors).
Mike Dahlin +4 more
doaj +1 more source
We propose a blockchain‐based system to enhance cloud systems' resilience against distributed denial of service attacks. Our approach integrates a hierarchical risk‐based attack tolerance mechanism with smart contracts, dynamically estimating risks at local, cluster, and global levels using Dempster–Shafer theory. Simulations show improved availability,
Faiza Benmenzer +2 more
wiley +1 more source
Integrity monitoring of virtual machines components based on the KVM hypervisor
Today, virtualization is widely used to provide scalable resources. Since this technology means sharing resources using some abstract layer, the placement and processing of information of various access levels in such systems poses a security risk.
Denis O. Stasyev
doaj +1 more source
Deploying Virtual Machines on Shared Platforms [PDF]
In this report, we describe mechanisms for secure deployment of virtual machines on shared platforms looking into a telecommunication cloud use case, which is also presented in this report. The architecture we present focuses on the security requirements
Aslam, Mudassar, Gehrmann, Christian
core +1 more source
Experimental assessment of containers running on top of virtual machines
In this paper, the performance of containers running on top of virtual machines is experimentally compared with standalone virtual machines and containers based on different hardware resources, including the processor, main memory, disk, and network in a real testbed by running the most commonly used benchmarks.
Hossein Aqasizade +2 more
wiley +1 more source
Network operators are facing significant challenges meeting the demand for more bandwidth, agile infrastructures, innovative services, while keeping costs low.
Lombardo, Francesco +6 more
core +1 more source
enCloud: Aspect‐oriented trusted service migration on SGX‐enabled cloud VM
Abstract This paper presents enCloud, a new aspect‐oriented trusted service migration with SGX‐enabled cloud VM. Addressing the challenge of reconciling end‐to‐end security with VM migration, enCloud incorporates two key aspects: (1) end‐to‐end security for enclave context migration, and (2) VM abstraction for conventional VM context migration.
Seehwan Yoo +4 more
wiley +1 more source
An efficient secure predictive demand forecasting system using Ethereum virtual machine
The article is about predictive analysis on Ethereum virtual machine. Abstract Predictive demand forecasting plays a pivotal role in optimizing supply chain management, enabling businesses to effectively allocate resources and minimize operational inefficiencies.
Himani Saraswat +2 more
wiley +1 more source

