Results 1 to 10 of about 38,187 (179)

Security consideration for virtualization [PDF]

open access: yes, 2008
Virtualization is not a new technology, but has recently experienced a resurgence of interest among industry and research. New products and technologies are emerging quickly, and are being deployed with little considerations to security concerns. It is vital to understand that virtualization does not improve security by default.
Gebhardt, Carl
openaire   +3 more sources

Virtualization Airborne Trusted General Computing Technology

open access: yesApplied Sciences, 2023
Aircraft information service systems, such as airborne information systems, airborne integrated maintenance management systems, and cabin management systems, have greatly improved the ease of use and maintenance of civil aircraft.
Shuang Zhang   +4 more
doaj   +1 more source

Virtualization security:the good,the bad and the ugly

open access: yes网络与信息安全学报, 2016
The virtualization security has increasingly drawn widespread attention with the spread of cloud computing in recent years.Thanks to another level of indirection,virtualization can provide stronger isolation mechanisms,as well as bottom-up security ...
Yu-tao LIU,Hai-bo CHEN
doaj   +3 more sources

CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]

open access: yes, 2012
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha   +16 more
core   +3 more sources

ABSTRACT MODELS FOR SYSTEM VIRTUALIZATION [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2015
The paper is dedicated to issues of system objects securing (system files and user system or application configuration files) against unauthorized access including denial of service attacks.
M. G. Koveshnikov   +2 more
doaj   +1 more source

Virtual Machines and Networks - Installation, Performance Study, Advantages and Virtualization Options [PDF]

open access: yes, 2011
The interest in virtualization has been growing rapidly in the IT industry because of inherent benefits like better resource utilization and ease of system manageability.
Ali, Ishtiaq, Meghanathan, Natarajan
core   +1 more source

Virtualization of the Encryption Card for Trust Access in Cloud Computing

open access: yesIEEE Access, 2017
The increasing use of virtualization puts stringent security requirements on software integrity and workload isolation of cloud computing. The encryption card provides hardware cryptographic services for users and is believed to be superior to software ...
Deliang Xu   +5 more
doaj   +1 more source

Grid Infrastructure for Domain Decomposition Methods in Computational ElectroMagnetics [PDF]

open access: yes, 2012
The accurate and efficient solution of Maxwell's equation is the problem addressed by the scientific discipline called Computational ElectroMagnetics (CEM).
Francavilla, A.   +4 more
core   +2 more sources

Security Isolation Strategy Mechanism for Lightweight Virtualization Environment

open access: yesITM Web of Conferences, 2017
For cloud service providers, lightweight virtualization is a more economical way of virtualization. While the user is worried about the safety of applications and data of the container, due to the container sharing the underlying interface and the kernel,
Liu Qian   +3 more
doaj   +1 more source

Enabling Hardware Performance Counters for Microkernel-Based Virtualization on Embedded Systems

open access: yesIEEE Access, 2020
Virtualization techniques continue to evolve at rapid speed and have now come to find its application in embedded and mobile computing devices. Virtualization improves the utilization of system resources effectively and also enhances security by ...
Deepa Mathew   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy