Results 81 to 90 of about 13,965 (202)

Survey of research on confidential computing

open access: yesIET Communications, Volume 18, Issue 9, Page 535-556, June 2024.
This paper provides a comprehensive overview of the development process of confidential computing, summarizing its current research status and issues, which focuses on the security requirements for data security and privacy protection. Abstract As the global data strategy deepens and data elements accelerate integrating and flowing more rapidly, the ...
Dengguo Feng   +5 more
wiley   +1 more source

P4toNFV: Offloading from P4 switches to NFV in programmable data planes

open access: yesInternational Journal of Communication Systems, Volume 37, Issue 5, 25 March 2024.
P4 switches, which harness both the robustness of hardware networking and the flexibility of software operations, grapple with intricate processing tasks. To tackle this, our research introduces an analytical model for efficient traffic offloading to NFV, utilizing a Bounded adaptation of Brent's optimization technique. Employing parametric sensitivity
Adrian Pekar   +4 more
wiley   +1 more source

Availability‐aware virtual network function placement based on multidimensional universal generating functions

open access: yesInternational Journal of Network Management, Volume 34, Issue 2, March/April 2024.
We propose a virtual network function (VNF) placement model on a per‐VNF instance basis that considers the availability of the service function chain (SFC). We develop an availability computation method with reduced computation time using a multidimensional universal generating function.
Kengo Arakawa, Eiji Oki
wiley   +1 more source

TEACHING CLOUD COMPUTING FOR SOFTWARE ENGINEER’S STUDENTS

open access: yesÌнформаційні технології в освіті, 2013
We suggest content and ways of learning and teaching Cloud Computing course that help to prepare successful software engineers. We consider scheme of the virtualization of laboratory environment that can be used not only for Cloud Computing but also in ...
Z. Seidametova, G. Seydametov
doaj  

Trusted Computing and Secure Virtualization in Cloud Computing [PDF]

open access: yes, 2012
Large-scale deployment and use of cloud computing in industry is accompanied and in the same time hampered by concerns regarding protection of data handled by cloud computing providers.
Paladi, Nicolae
core   +2 more sources

Deferred DMA Attack: A Threat for Bypassing the IOMMU in Dynamic Hypervisors

open access: yesIEEE Access
The Input–Output Memory Management Unit (IOMMU) is a crucial hardware component for enforcing access control for bus-master devices on the main memory. When properly configured by a hypervisor, it provides reliable protection against Direct Memory
Jean De Bonfils Lavernelle   +3 more
doaj   +1 more source

Detecting System of Nested Hardware Virtual Machine Monitor

open access: yesБезопасность информационных технологий, 2015
Method of nested hardware virtual machine monitor detection was proposed in this work. The method is based on HVM timing attack. In case of HVM presence in system, the number of different instruction sequences execution time values will increase. We used
Artem Vladimirovich Iuzbashev
doaj  

Business Hypervisors for Real-time Applications

open access: yesEngineering, Technology & Applied Science Research, 2015
System virtualization is one of the hottest trends in information technology today. It is not just another nice to use technology but has become fundamental across the business world. It is successfully used with many business application classes where cloud computing is the most visual one.
Perneel, Luc   +4 more
openaire   +3 more sources

EXPERIENCE OF USING MICROSOFT VIRTUALIZATION IN IT ENVIRONMENT OF UNIVERSITY

open access: yesÌнформаційні технології в освіті, 2012
It is shown that server’s Virtualization and consolidation of virtual machines on a few of physical servers increases efficiency of capital investments for University in an equipment with the simultaneous increase of availability of resources, reducing ...
V. Timofeev   +4 more
doaj  

Cyber threats to the Private Academic Cloud [PDF]

open access: yesInternational Journal of Electronics and Telecommunications
The potential breach of access to confidential content hosted in a university's Private Academic Cloud (PAC) underscores the need for developing new protection methods.
Valerii Lakhno   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy