A Security Monitoring Framework For Virtualization Based HEP Infrastructures
High Energy Physics (HEP) distributed computing infrastructures require automatic tools to monitor, analyze and react to potential security incidents. These tools should collect and inspect data such as resource consumption, logs and sequence of system ...
A. Gomez Ramirez +6 more
core +1 more source
Safety assessment of virtualization computing platform for avionics system of civil aircraft
Aiming at the main problems that affect the security of airborne computing platform after virtualization, such as time-space isolation, fault isolation and schedulability, this paper studies the security level evaluation of airborne computing platform ...
YANG Huan +4 more
doaj +1 more source
CyExec*: A High-Performance Container-Based Cyber Range With Scenario Randomization
With increasing threats to information security, information security education through practical exercises specifically cyber range has attracted attention.
Ryotaro Nakata, Akira Otsuka
doaj +1 more source
Design and analysis of intelligent service chain system for network security resource pool
The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security ...
Zenan WANG +2 more
doaj +3 more sources
TCG based approach for secure management of virtualized platforms: state-of-the-art [PDF]
There is a strong trend shift in the favor of adopting virtualization to get business benefits. The provisioning of virtualized enterprise resources is one kind of many possible scenarios.
Aslam, Mudassar, Gehrmann, Christian
core
Classification of Existing Virtualization Methods Used in Telecommunication Networks
This article studies the existing methods of virtualization of different resources. The positive and negative aspects of each of the methods are analyzed, the perspectivity of the approach is noted.
Ageyev, Dmytro +3 more
core +1 more source
Automatic Generation of Simulators for Processors Enhanced for Security in Virtualization
All new computer architectures need to be performance evaluated for acceptance and simulation is the most widely used method for evaluation of new processor designs.
Swapneel C. Mhatre, Priya Chandran
doaj +1 more source
The Study and Evaluation of ARM-Based Mobile Virtualization
In common sense, virtualization technology is adopted to offer several isolated execution environments and make better use of computational resources in server environment.
Lei Xu, Zonghui Wang, Wenzhi Chen
doaj +1 more source
Overview of research on trusted attestation technology of cloud virtualization platform
With the rapid development of cloud computing, the security issues of cloud platforms have also attracted much attention.Trusted computing is an essential supporting technology in the cloud computing security system.Trusted attestation is an important ...
Bibo TU +4 more
doaj +2 more sources
Secure Virtualization and Multicore Platforms State-of-the-Art report [PDF]
SVaM
Douglas, Heradon, Gehrmann, Christian
core +1 more source

