Results 11 to 20 of about 17,798 (178)
Access Improvement in Healthcare: Be Quick, but Don't Hurry? [PDF]
ABSTRACT Background Access improvement is a fundamental component of value‐based healthcare as it inherently promotes quality by eliminating chokepoints, redundancies, and inefficiencies that could hinder the provisioning of timely care. Yet as healthcare organizations struggle with cost containment, the question of how to most effectively enhance ...
Chen AM.
europepmc +2 more sources
From the Field to the Laboratory: The Theory‐Practice Research of Peter J. Carnevale
Abstract As colleagues and collaborators, we reflect on the work and legacy of Peter Carnevale, currently professor at the University of Southern California, and recipient of the 2002 Jeffrey Z. Rubin Theory‐to‐Practice Award of the International Association for Conflict Management (IACM). We review Carnevale’s main contributions, including his work on
Linda L. Putnam +3 more
wiley +1 more source
Virtualization Security Combining Mandatory Access Control and Virtual Machine Introspection [PDF]
Virtualization has become a target for attacks in cloud computing environments. Existing approaches to protecting the virtualization environment against the attacks are limited in protection scope and are with high overheads. This paper proposes a novel virtualization security solution which aims to provide comprehensive protection of the ...
Win, Thu Yein +2 more
openaire +2 more sources
Automatically bridging the semantic gap in machine introspection [PDF]
Disclosed are various embodiments that facilitate automatically bridging the semantic gap in machine introspection. It may be determined that a program executed by a first virtual machine is requested to introspect a second virtual machine. A system call
Fu, Yangchun, Lin, Zhiqiang
core +1 more source
Multi-aspect, robust, and memory exclusive guest os fingerprinting [PDF]
Precise fingerprinting of an operating system (OS) is critical to many security and forensics applications in the cloud, such as virtual machine (VM) introspection, penetration testing, guest OS administration, kernel dump analysis, and memory forensics.
Fu, Y, Gu, Y, Lin, Z, Prakash, A, Yin, H
core +1 more source
Cognitive Science and Psychology [PDF]
The protocol algorithm abstracted from a human cognizer's own narrative in the course of doing a cognitive task is an explanation of the corresponding mental activity in Pylyshyn's (1984) virtual machine model of mind.
Chow, Dr Siu L.
core +1 more source
Virtualization security:the good,the bad and the ugly
The virtualization security has increasingly drawn widespread attention with the spread of cloud computing in recent years.Thanks to another level of indirection,virtualization can provide stronger isolation mechanisms,as well as bottom-up security ...
Yu-tao LIU, Hai-bo CHEN
doaj +3 more sources
Open Programming Language Interpreters [PDF]
Context: This paper presents the concept of open programming language interpreters and the implementation of a framework-level metaobject protocol (MOP) to support them.
Cazzola, Walter, Shaqiri, Albert
core +2 more sources
CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha +16 more
core +3 more sources
Checking Function-Level Kernel Control Flow Integrity for Cloud Computing
With the advancement of cloud computing, the control flow integrity (CFI) of virtual machines' kernel becomes more and more important for the security of cloud services. Many CFI checking and protecting approaches have been proposed.
Lin Ye +6 more
doaj +1 more source

