Results 61 to 70 of about 13,965 (202)

SparkGrid: Blockchain Assisted Secure Query Scheduling and Dynamic Risk Assessment for Live Migration of Services in Apache Spark‐Based Grid Environment

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
Grid computing is an emerging technology that enabled the heterogeneous collection of data and provisioning of services to the users. Due to the high amount of incoming heterogeneous request, grid computing needs an efficient scheduling to reduce execution time and satisfy service level agreement (SLA) and quality of service (QoS) requirements.
Gangasandra Mahadevaiah Kiran   +1 more
wiley   +1 more source

HyperWallet: cryptocurrency wallet as a secure hypervisor-based application

open access: yesEURASIP Journal on Information Security
We present VirtSecIO, a hypervisor-based platform for executing secure modules. VirtSecIO provides the modules with secure paths to peripheral devices, which can be shared between the modules and the operating system.
Nezer Jacob Zaidenberg   +1 more
doaj   +1 more source

Toward the Verification of a Simple Hypervisor [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2011
Virtualization promises significant benefits in security, efficiency, dependability, and cost. Achieving these benefits depends upon the reliability of the underlying virtual machine monitors (hypervisors).
Mike Dahlin   +4 more
doaj   +1 more source

Reinforcing Cloud Attack Tolerance on a Large Scale: Advanced Blockchain Technologies With Hierarchical Risk and Smart Contracts

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
We propose a blockchain‐based system to enhance cloud systems' resilience against distributed denial of service attacks. Our approach integrates a hierarchical risk‐based attack tolerance mechanism with smart contracts, dynamically estimating risks at local, cluster, and global levels using Dempster–Shafer theory. Simulations show improved availability,
Faiza Benmenzer   +2 more
wiley   +1 more source

Integrity monitoring of virtual machines components based on the KVM hypervisor

open access: yesБезопасность информационных технологий, 2020
Today, virtualization is widely used to provide scalable resources. Since this technology means sharing resources using some abstract layer, the placement and processing of information of various access levels in such systems poses a security risk.
Denis O. Stasyev
doaj   +1 more source

Deploying Virtual Machines on Shared Platforms [PDF]

open access: yes, 2011
In this report, we describe mechanisms for secure deployment of virtual machines on shared platforms looking into a telecommunication cloud use case, which is also presented in this report. The architecture we present focuses on the security requirements
Aslam, Mudassar, Gehrmann, Christian
core   +1 more source

Experimental assessment of containers running on top of virtual machines

open access: yesIET Networks, Volume 14, Issue 1, January/December 2025.
In this paper, the performance of containers running on top of virtual machines is experimentally compared with standalone virtual machines and containers based on different hardware resources, including the processor, main memory, disk, and network in a real testbed by running the most commonly used benchmarks.
Hossein Aqasizade   +2 more
wiley   +1 more source

On the Fly Orchestration of Unikernels: Tuning and Performance Evaluation of Virtual Infrastructure Managers

open access: yes, 2018
Network operators are facing significant challenges meeting the demand for more bandwidth, agile infrastructures, innovative services, while keeping costs low.
Lombardo, Francesco   +6 more
core   +1 more source

enCloud: Aspect‐oriented trusted service migration on SGX‐enabled cloud VM

open access: yesSoftware: Practice and Experience, Volume 54, Issue 12, Page 2454-2480, December 2024.
Abstract This paper presents enCloud, a new aspect‐oriented trusted service migration with SGX‐enabled cloud VM. Addressing the challenge of reconciling end‐to‐end security with VM migration, enCloud incorporates two key aspects: (1) end‐to‐end security for enclave context migration, and (2) VM abstraction for conventional VM context migration.
Seehwan Yoo   +4 more
wiley   +1 more source

An efficient secure predictive demand forecasting system using Ethereum virtual machine

open access: yesIET Blockchain, Volume 4, Issue S1, Page 526-542, December 2024.
The article is about predictive analysis on Ethereum virtual machine. Abstract Predictive demand forecasting plays a pivotal role in optimizing supply chain management, enabling businesses to effectively allocate resources and minimize operational inefficiencies.
Himani Saraswat   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy