Security consideration for virtualization [PDF]
Virtualization is not a new technology, but has recently experienced a resurgence of interest among industry and research. New products and technologies are emerging quickly, and are being deployed with little considerations to security concerns. It is vital to understand that virtualization does not improve security by default.
Gebhardt, Carl
openaire +3 more sources
Virtualization Airborne Trusted General Computing Technology
Aircraft information service systems, such as airborne information systems, airborne integrated maintenance management systems, and cabin management systems, have greatly improved the ease of use and maintenance of civil aircraft.
Shuang Zhang +4 more
doaj +1 more source
Virtualization security:the good,the bad and the ugly
The virtualization security has increasingly drawn widespread attention with the spread of cloud computing in recent years.Thanks to another level of indirection,virtualization can provide stronger isolation mechanisms,as well as bottom-up security ...
Yu-tao LIU,Hai-bo CHEN
doaj +3 more sources
CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha +16 more
core +3 more sources
ABSTRACT MODELS FOR SYSTEM VIRTUALIZATION [PDF]
The paper is dedicated to issues of system objects securing (system files and user system or application configuration files) against unauthorized access including denial of service attacks.
M. G. Koveshnikov +2 more
doaj +1 more source
Virtual Machines and Networks - Installation, Performance Study, Advantages and Virtualization Options [PDF]
The interest in virtualization has been growing rapidly in the IT industry because of inherent benefits like better resource utilization and ease of system manageability.
Ali, Ishtiaq, Meghanathan, Natarajan
core +1 more source
Virtualization of the Encryption Card for Trust Access in Cloud Computing
The increasing use of virtualization puts stringent security requirements on software integrity and workload isolation of cloud computing. The encryption card provides hardware cryptographic services for users and is believed to be superior to software ...
Deliang Xu +5 more
doaj +1 more source
Grid Infrastructure for Domain Decomposition Methods in Computational ElectroMagnetics [PDF]
The accurate and efficient solution of Maxwell's equation is the problem addressed by the scientific discipline called Computational ElectroMagnetics (CEM).
Francavilla, A. +4 more
core +2 more sources
Security Isolation Strategy Mechanism for Lightweight Virtualization Environment
For cloud service providers, lightweight virtualization is a more economical way of virtualization. While the user is worried about the safety of applications and data of the container, due to the container sharing the underlying interface and the kernel,
Liu Qian +3 more
doaj +1 more source
Enabling Hardware Performance Counters for Microkernel-Based Virtualization on Embedded Systems
Virtualization techniques continue to evolve at rapid speed and have now come to find its application in embedded and mobile computing devices. Virtualization improves the utilization of system resources effectively and also enhances security by ...
Deepa Mathew +3 more
doaj +1 more source

