Results 121 to 130 of about 38,187 (179)
Optimizing hybrid network topologies in communication networks through irregularity strength. [PDF]
Naqvi SAA +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, 2009
Many organization fail to take into account the security of virtual servers, which can result in potential loss of data from internal and external threats. Virtualization has now become commonplace throughout the world; however few if any organizations know the risks associated with running multiple machines on the same physical hardware.
Edward Ray, Eugene Schultz
openaire +1 more source
Many organization fail to take into account the security of virtual servers, which can result in potential loss of data from internal and external threats. Virtualization has now become commonplace throughout the world; however few if any organizations know the risks associated with running multiple machines on the same physical hardware.
Edward Ray, Eugene Schultz
openaire +1 more source
Space and Culture, 2012
This article uses a governmentality and discourse analysis approach to analyze cyber security policy literature. It examines the problems of construction of virtual space and current efforts to secure this space political and technologically. It extracts a model of cyber security discourse that constructs cyberspace as ungovernable, unknowable, a ...
David Barnard-Wills, Debi Ashenden
openaire +1 more source
This article uses a governmentality and discourse analysis approach to analyze cyber security policy literature. It examines the problems of construction of virtual space and current efforts to secure this space political and technologically. It extracts a model of cyber security discourse that constructs cyberspace as ungovernable, unknowable, a ...
David Barnard-Wills, Debi Ashenden
openaire +1 more source
ACM SIGOPS Operating Systems Review, 2007
This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. The approach, which we call Secure Virtual Architecture (SVA), defines a virtual, low-level, typed instruction set suitable ...
John Criswell +3 more
openaire +1 more source
This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. The approach, which we call Secure Virtual Architecture (SVA), defines a virtual, low-level, typed instruction set suitable ...
John Criswell +3 more
openaire +1 more source
Secure virtualization for cloud computing
Journal of Network and Computer Applications, 2011Cloud computing adoption and diffusion are threatened by unresolved security issues that affect both the cloud provider and the cloud user. In this paper, we show how virtualization can increase the security of cloud computing, by protecting both the integrity of guest virtual machines and the cloud infrastructure components.
Lombardi, Flavio, DI PIETRO, ROBERTO
openaire +3 more sources
ACM Computing Surveys, 2013
Although system virtualization is not a new paradigm, the way in which it is used in modern system architectures provides a powerful platform for system building, the advantages of which have only been realized in recent years, as a result of the rapid deployment of commodity hardware and software systems.
Michael Pearce +2 more
openaire +2 more sources
Although system virtualization is not a new paradigm, the way in which it is used in modern system architectures provides a powerful platform for system building, the advantages of which have only been realized in recent years, as a result of the rapid deployment of commodity hardware and software systems.
Michael Pearce +2 more
openaire +2 more sources
Secure virtual machine migration in virtualized environment
2018 2nd International Conference on Inventive Systems and Control (ICISC), 2018Virtualization is a technology which helps the users to access the cloud services. Virtual machine gives the abstract view of the physical machine. User can utilize the services from the cloud provider by requesting the virtual machine. Migration of Virtual machine is required when the load increases, insufficient resources or any problem with the ...
H. M. Anitha, P. Jayarekha
openaire +1 more source
Proceedings of the 4th ACM conference on Data and application security and privacy, 2014
Virtualization has been a major enabling technology for improving trustworthiness and tamper-resistance of computer security functions. In the past decade, we have witnessed the development of virtualization-based techniques for attack/malware monitoring, detection, prevention, and profiling.
openaire +1 more source
Virtualization has been a major enabling technology for improving trustworthiness and tamper-resistance of computer security functions. In the past decade, we have witnessed the development of virtualization-based techniques for attack/malware monitoring, detection, prevention, and profiling.
openaire +1 more source
2002
Abstract : The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application resources, while respecting organizational autonomy over local resources. The infrastructure is transparent to applications, which may be accessed via a web server, or may be based on Java RMI, or Microsoft's ...
openaire +1 more source
Abstract : The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application resources, while respecting organizational autonomy over local resources. The infrastructure is transparent to applications, which may be accessed via a web server, or may be based on Java RMI, or Microsoft's ...
openaire +1 more source

