Results 11 to 20 of about 17,798 (178)

Access Improvement in Healthcare: Be Quick, but Don't Hurry? [PDF]

open access: yesLearn Health Syst
ABSTRACT Background Access improvement is a fundamental component of value‐based healthcare as it inherently promotes quality by eliminating chokepoints, redundancies, and inefficiencies that could hinder the provisioning of timely care. Yet as healthcare organizations struggle with cost containment, the question of how to most effectively enhance ...
Chen AM.
europepmc   +2 more sources

From the Field to the Laboratory: The Theory‐Practice Research of Peter J. Carnevale

open access: yesNegotiation and Conflict Management Research, EarlyView., 2020
Abstract As colleagues and collaborators, we reflect on the work and legacy of Peter Carnevale, currently professor at the University of Southern California, and recipient of the 2002 Jeffrey Z. Rubin Theory‐to‐Practice Award of the International Association for Conflict Management (IACM). We review Carnevale’s main contributions, including his work on
Linda L. Putnam   +3 more
wiley   +1 more source

Virtualization Security Combining Mandatory Access Control and Virtual Machine Introspection [PDF]

open access: yes2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, 2014
Virtualization has become a target for attacks in cloud computing environments. Existing approaches to protecting the virtualization environment against the attacks are limited in protection scope and are with high overheads. This paper proposes a novel virtualization security solution which aims to provide comprehensive protection of the ...
Win, Thu Yein   +2 more
openaire   +2 more sources

Automatically bridging the semantic gap in machine introspection [PDF]

open access: yes, 2016
Disclosed are various embodiments that facilitate automatically bridging the semantic gap in machine introspection. It may be determined that a program executed by a first virtual machine is requested to introspect a second virtual machine. A system call
Fu, Yangchun, Lin, Zhiqiang
core   +1 more source

Multi-aspect, robust, and memory exclusive guest os fingerprinting [PDF]

open access: yes, 2014
Precise fingerprinting of an operating system (OS) is critical to many security and forensics applications in the cloud, such as virtual machine (VM) introspection, penetration testing, guest OS administration, kernel dump analysis, and memory forensics.
Fu, Y, Gu, Y, Lin, Z, Prakash, A, Yin, H
core   +1 more source

Cognitive Science and Psychology [PDF]

open access: yes, 1994
The protocol algorithm abstracted from a human cognizer's own narrative in the course of doing a cognitive task is an explanation of the corresponding mental activity in Pylyshyn's (1984) virtual machine model of mind.
Chow, Dr Siu L.
core   +1 more source

Virtualization security:the good,the bad and the ugly

open access: yes网络与信息安全学报, 2016
The virtualization security has increasingly drawn widespread attention with the spread of cloud computing in recent years.Thanks to another level of indirection,virtualization can provide stronger isolation mechanisms,as well as bottom-up security ...
Yu-tao LIU, Hai-bo CHEN
doaj   +3 more sources

Open Programming Language Interpreters [PDF]

open access: yes, 2017
Context: This paper presents the concept of open programming language interpreters and the implementation of a framework-level metaobject protocol (MOP) to support them.
Cazzola, Walter, Shaqiri, Albert
core   +2 more sources

CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]

open access: yes, 2012
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha   +16 more
core   +3 more sources

Checking Function-Level Kernel Control Flow Integrity for Cloud Computing

open access: yesIEEE Access, 2018
With the advancement of cloud computing, the control flow integrity (CFI) of virtual machines' kernel becomes more and more important for the security of cloud services. Many CFI checking and protecting approaches have been proposed.
Lin Ye   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy