Results 21 to 30 of about 17,865 (172)

CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]

open access: yes, 2012
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha   +16 more
core   +3 more sources

Checking Function-Level Kernel Control Flow Integrity for Cloud Computing

open access: yesIEEE Access, 2018
With the advancement of cloud computing, the control flow integrity (CFI) of virtual machines' kernel becomes more and more important for the security of cloud services. Many CFI checking and protecting approaches have been proposed.
Lin Ye   +6 more
doaj   +1 more source

On Some Limitations of Information Flow Tracking in Full-system Emulators

open access: yesТруды Института системного программирования РАН, 2018
Tracking and verification of data flows includes set of techniques that can be applied to make applications more secure, to perform software analysis for debugging or reverse engineering, and so on. Taint analysis is one of the techniques used to control
M. A. Klimushenkova   +5 more
doaj   +1 more source

Classifying malware attacks in IaaS cloud environments

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2017
In the last few years, research has been motivated to provide a categorization and classification of security concerns accompanying the growing adaptation of Infrastructure as a Service (IaaS) clouds. Studies have been motivated by the risks, threats and
Noëlle Rakotondravony   +8 more
doaj   +1 more source

Dynamic and Transparent Analysis of Commodity Production Systems [PDF]

open access: yes, 2010
We propose a framework that provides a programming interface to perform complex dynamic system-level analyses of deployed production systems. By leveraging hardware support for virtualization available nowadays on all commodity machines, our framework is
Fattori, Aristide   +3 more
core   +1 more source

Providing Self-Aware Systems with Reflexivity

open access: yes, 2017
We propose a new type of self-aware systems inspired by ideas from higher-order theories of consciousness. First, we discussed the crucial distinction between introspection and reflexion.
A Church   +21 more
core   +1 more source

Notes towards an anthropology of the internet

open access: yesHorizontes Antropológicos, 2004
What might an anthropology of the internet look like? It require a combination of introspection, personal judgment and world history to explore the universe of cyberspace. This world is not sufficient to itself, nor is it 'the world'.
Keith Hart
doaj   +1 more source

Open Programming Language Interpreters [PDF]

open access: yes, 2017
Context: This paper presents the concept of open programming language interpreters and the implementation of a framework-level metaobject protocol (MOP) to support them.
Cazzola, Walter, Shaqiri, Albert
core   +2 more sources

Human Capital 4.0: Readiness of Initial Vocational Education Programmes in Italy and Germany

open access: yesInternational Journal of Training and Development, EarlyView.
ABSTRACT The rapid pace of technological innovation and the advent of Industry 4.0 have profoundly transformed labour markets and the nature of work. This paper examines the preparedness of Initial Vocational Education and Training (IVET) programmes in Germany and Italy to meet the demands of Human Capital 4.0. Utilising a comparative analysis of three
Luca Antonazzo, Susanne Peters
wiley   +1 more source

A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus

open access: yesIEEE Access, 2018
Smart campus is an exciting, new, and emerging research area that uses technology and infrastructure to support and improve its processes in campus services, teaching, learning, and research, especially, the explosive growth in knowledge makes the role ...
Zhihong Tian   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy