Results 81 to 90 of about 13,965 (202)
Survey of research on confidential computing
This paper provides a comprehensive overview of the development process of confidential computing, summarizing its current research status and issues, which focuses on the security requirements for data security and privacy protection. Abstract As the global data strategy deepens and data elements accelerate integrating and flowing more rapidly, the ...
Dengguo Feng +5 more
wiley +1 more source
P4toNFV: Offloading from P4 switches to NFV in programmable data planes
P4 switches, which harness both the robustness of hardware networking and the flexibility of software operations, grapple with intricate processing tasks. To tackle this, our research introduces an analytical model for efficient traffic offloading to NFV, utilizing a Bounded adaptation of Brent's optimization technique. Employing parametric sensitivity
Adrian Pekar +4 more
wiley +1 more source
We propose a virtual network function (VNF) placement model on a per‐VNF instance basis that considers the availability of the service function chain (SFC). We develop an availability computation method with reduced computation time using a multidimensional universal generating function.
Kengo Arakawa, Eiji Oki
wiley +1 more source
TEACHING CLOUD COMPUTING FOR SOFTWARE ENGINEER’S STUDENTS
We suggest content and ways of learning and teaching Cloud Computing course that help to prepare successful software engineers. We consider scheme of the virtualization of laboratory environment that can be used not only for Cloud Computing but also in ...
Z. Seidametova, G. Seydametov
doaj
Trusted Computing and Secure Virtualization in Cloud Computing [PDF]
Large-scale deployment and use of cloud computing in industry is accompanied and in the same time hampered by concerns regarding protection of data handled by cloud computing providers.
Paladi, Nicolae
core +2 more sources
Deferred DMA Attack: A Threat for Bypassing the IOMMU in Dynamic Hypervisors
The Input–Output Memory Management Unit (IOMMU) is a crucial hardware component for enforcing access control for bus-master devices on the main memory. When properly configured by a hypervisor, it provides reliable protection against Direct Memory
Jean De Bonfils Lavernelle +3 more
doaj +1 more source
Detecting System of Nested Hardware Virtual Machine Monitor
Method of nested hardware virtual machine monitor detection was proposed in this work. The method is based on HVM timing attack. In case of HVM presence in system, the number of different instruction sequences execution time values will increase. We used
Artem Vladimirovich Iuzbashev
doaj
Business Hypervisors for Real-time Applications
System virtualization is one of the hottest trends in information technology today. It is not just another nice to use technology but has become fundamental across the business world. It is successfully used with many business application classes where cloud computing is the most visual one.
Perneel, Luc +4 more
openaire +3 more sources
EXPERIENCE OF USING MICROSOFT VIRTUALIZATION IN IT ENVIRONMENT OF UNIVERSITY
It is shown that server’s Virtualization and consolidation of virtual machines on a few of physical servers increases efficiency of capital investments for University in an equipment with the simultaneous increase of availability of resources, reducing ...
V. Timofeev +4 more
doaj
Cyber threats to the Private Academic Cloud [PDF]
The potential breach of access to confidential content hosted in a university's Private Academic Cloud (PAC) underscores the need for developing new protection methods.
Valerii Lakhno +6 more
doaj +1 more source

