Results 301 to 310 of about 389,766 (311)
Some of the next articles are maybe not open access.
2020
Virtual machine encryption is a robust feature that keeps VMs safe and secure from any unauthorized access. Disks can be encrypted by using the cryptographic keys that are secured in Azure Key Vault, which uses FIPS 140-2 level 2 standards. The cryptographic keys are used to encrypt and decrypt the virtual disks attached to your VM.
openaire +2 more sources
Virtual machine encryption is a robust feature that keeps VMs safe and secure from any unauthorized access. Disks can be encrypted by using the cryptographic keys that are secured in Azure Key Vault, which uses FIPS 140-2 level 2 standards. The cryptographic keys are used to encrypt and decrypt the virtual disks attached to your VM.
openaire +2 more sources
Allocation of Virtual Machines
2016In this chapter, we introduce a solution to the problem of cost-effective VM allocation and reallocation. Unlike traditional solutions, which typically reallocate VMs based on a greedy algorithm such as First Fit (each VM is allocated to the first server in which it will fit), Best Fit (each VM is allocated to the active server with the least residual ...
Wanjiun Liao, Linjiun Tsai
openaire +2 more sources
The soul of the virtual machine
IEEE Spectrum, 2011Java's ability to run on many different kinds of computers grew out of software devised decades before - The enduring appeal of Java isn't hard to understand: With Java, you write code once and it can run on almost any modern computer or operating system-PC or Mac, Windows, Linux, OS X, whatever.
openaire +2 more sources
IEEE Security & Privacy Magazine, 2007
Past and present experiences point to a seemingly invariant conclusion: virtualization continues to be a promising technology to address information security needs, but it will also continue to fall short of delivering on the ideal of a robust, trustworthy, and mythically flawless computing environment.
openaire +2 more sources
Past and present experiences point to a seemingly invariant conclusion: virtualization continues to be a promising technology to address information security needs, but it will also continue to fall short of delivering on the ideal of a robust, trustworthy, and mythically flawless computing environment.
openaire +2 more sources
Proceedings of the 7th International Software Process Workshop, Communication and Coordination in the Software Process', 2005
The Process Virtual Machine is a process kernel designed to support multiple process formalisms by providing a internal formalism in which to define process meta-models; a common process infrastructure to support the definition, instantiation, and enactment of process models expressed in those meta-models; generic support for distribution, persistence,
openaire +2 more sources
The Process Virtual Machine is a process kernel designed to support multiple process formalisms by providing a internal formalism in which to define process meta-models; a common process infrastructure to support the definition, instantiation, and enactment of process models expressed in those meta-models; generic support for distribution, persistence,
openaire +2 more sources
2001
In this chapter we refine the virtual machines of the previous chapters to a dynamic machine that incorporates dynamic loading and linking of classes. This involves new rules for class loader methods and an extension of switch VM E to switch VM D to cope with referencing loaded classes (together with their superclasses) before they are linked.
Joachim Schmid+2 more
openaire +2 more sources
In this chapter we refine the virtual machines of the previous chapters to a dynamic machine that incorporates dynamic loading and linking of classes. This involves new rules for class loader methods and an extension of switch VM E to switch VM D to cope with referencing loaded classes (together with their superclasses) before they are linked.
Joachim Schmid+2 more
openaire +2 more sources
International Journal of Information and Computer Security, 2017
In the present article we have described the security of the virtual machine (VM). The virtual environment is not fully risk-proof. Various features of the virtual platform originate from the possibilities of threats. We have depicted how those threats affect the deployment of a VM in the cloud computing.
openaire +2 more sources
In the present article we have described the security of the virtual machine (VM). The virtual environment is not fully risk-proof. Various features of the virtual platform originate from the possibilities of threats. We have depicted how those threats affect the deployment of a VM in the cloud computing.
openaire +2 more sources
2015
So far in this book, I have shown you some of the basics of working with Hyper-V as well as how you can migrate virtual machines from a VMware host to a Hyper-V server. There are still some things that I want to show you regarding the day–to-day management and maintenance of Hyper-V.
openaire +2 more sources
So far in this book, I have shown you some of the basics of working with Hyper-V as well as how you can migrate virtual machines from a VMware host to a Hyper-V server. There are still some things that I want to show you regarding the day–to-day management and maintenance of Hyper-V.
openaire +2 more sources
1998
A compilation unit in a Java program contains classes and/or interfaces. The Java compiler compiles each class or interface into a class file, which is represented in a platform-independent binary format. A Java runtime system loads a class from the class file when it needs the class. It executes instructions in compiled methods loaded from class files.
openaire +2 more sources
A compilation unit in a Java program contains classes and/or interfaces. The Java compiler compiles each class or interface into a class file, which is represented in a platform-independent binary format. A Java runtime system loads a class from the class file when it needs the class. It executes instructions in compiled methods loaded from class files.
openaire +2 more sources