Results 71 to 80 of about 13,965 (202)

Interdependency Attack-Aware Secure and Performant Virtual Machine Allocation Policies With Low Attack Efficiency and Coverage

open access: yesIEEE Access
Cloud computing has completely changed IT (information technology) by providing IT resources as services on the internet. However, certain types of attacks, such as interdependency attacks, impede its wide adoption.
Bernard Ousmane Sane   +5 more
doaj   +1 more source

Robust by design: Designing ICT infrastructures using Twins

open access: yesDigital Twins and Applications, Volume 1, Issue 2, Page 169-181, December 2024.
Build and update a digital twin of an information and communication infrastructure to simulate how the infrastructure will be attacked. Use the output of the simulations to understand how to improve your infrastructure to defeat the attackers. Abstract Robust‐by‐design (RbD) is a design strategy that uses adversary emulation to strengthen the security ...
Fabrizio Baiardi
wiley   +1 more source

DCDIDP: A Distributed, Collaborative, and Data-driven IDP Framework for the Cloud [PDF]

open access: yes, 2011
Recent advances in distributed computing, grid computing, virtualization mechanisms, and utility computing led into Cloud Computing as one of the industry buzz words of our decade. As the popularity of the services provided in the cloud environment grows
Joshi, James BD   +2 more
core  

TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone

open access: yes, 2017
The rapid evolution of Internet-of-Things (IoT) technologies has led to an emerging need to make it smarter. A variety of applications now run simultaneously on an ARM-based processor.
Baumann A.   +9 more
core   +1 more source

Enhancing cloud security: A study on ensemble learning‐based intrusion detection systems

open access: yesIET Communications, Volume 18, Issue 16, Page 950-965, October 2024.
The proposed system uses an ensemble learning algorithm. This is a machine learning technique that collects information from weak classifiers and creates one robust classifier with higher accuracy than the weak individual classifiers. Abstract Cloud computing has become an essential technology for people and enterprises due to the simplicity and rapid ...
Maha Al‐Sharif, Anas Bushnag
wiley   +1 more source

SGXIO: Generic Trusted I/O Path for Intel SGX

open access: yes, 2017
Application security traditionally strongly relies upon security of the underlying operating system. However, operating systems often fall victim to software attacks, compromising security of applications as well.
Anati I.   +6 more
core   +1 more source

Steam computing paradigm: Cross‐layer solutions over cloud, fog, and edge computing

open access: yesIET Wireless Sensor Systems, Volume 14, Issue 5, Page 157-180, October 2024.
While fog computing mitigates some of the problems facing the achievement of prospective IoT Cyber Physical Systems (CPS) applications, fog nodes, such as edge data centres, smart gateways, and base stations may not encounter the quality level of future IoT‐ CPS applications in terms of latency, throughput, and energy constraints unless all fog, cloud,
Abir Mchergui   +4 more
wiley   +1 more source

Full‐mesh VPN performance evaluation for a secure edge‐cloud continuum

open access: yesSoftware: Practice and Experience, Volume 54, Issue 8, Page 1543-1564, August 2024.
Abstract The recent introduction of full‐mesh virtual private network (VPN) solutions which offer near native performance, coupled with modern encryption algorithms and easy scalability as a result of a central control plane have a strong potential to enable the implementation of a seamless edge‐cloud continuum.
Vojdan Kjorveziroski   +3 more
wiley   +1 more source

The Hypervisors of Safety using Technology of Hardware Virtualization

open access: yesБезопасность информационных технологий, 2013
In the article the approach to construction of system of protection of the information from unapproved access on the basis of program safety hypervisor for the hardware architecture which are not supporting technology of the hardware virtual machine is ...
Vladimir Leonovich Yevseyev   +3 more
doaj  

Virtualization: an old concept in a new approach [PDF]

open access: yes, 2007
Virtualization technology is transforming today’s IT community, offering new possi-bilities to improve the performance and efficiency of IT infrastructure by a dynamic mapping of the PC resources, enabling to run multiple applications and operating ...
Banica, Logica   +2 more
core  

Home - About - Disclaimer - Privacy