Results 31 to 40 of about 38,187 (179)

A Security Monitoring Framework For Virtualization Based HEP Infrastructures

open access: yes, 2017
High Energy Physics (HEP) distributed computing infrastructures require automatic tools to monitor, analyze and react to potential security incidents. These tools should collect and inspect data such as resource consumption, logs and sequence of system ...
A. Gomez Ramirez   +6 more
core   +1 more source

Safety assessment of virtualization computing platform for avionics system of civil aircraft

open access: yesXibei Gongye Daxue Xuebao
Aiming at the main problems that affect the security of airborne computing platform after virtualization, such as time-space isolation, fault isolation and schedulability, this paper studies the security level evaluation of airborne computing platform ...
YANG Huan   +4 more
doaj   +1 more source

CyExec*: A High-Performance Container-Based Cyber Range With Scenario Randomization

open access: yesIEEE Access, 2021
With increasing threats to information security, information security education through practical exercises specifically cyber range has attracted attention.
Ryotaro Nakata, Akira Otsuka
doaj   +1 more source

Design and analysis of intelligent service chain system for network security resource pool

open access: yes网络与信息安全学报, 2022
The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security ...
Zenan WANG   +2 more
doaj   +3 more sources

TCG based approach for secure management of virtualized platforms: state-of-the-art [PDF]

open access: yes, 2010
There is a strong trend shift in the favor of adopting virtualization to get business benefits. The provisioning of virtualized enterprise resources is one kind of many possible scenarios.
Aslam, Mudassar, Gehrmann, Christian
core  

Classification of Existing Virtualization Methods Used in Telecommunication Networks

open access: yes, 2019
This article studies the existing methods of virtualization of different resources. The positive and negative aspects of each of the methods are analyzed, the perspectivity of the approach is noted.
Ageyev, Dmytro   +3 more
core   +1 more source

Automatic Generation of Simulators for Processors Enhanced for Security in Virtualization

open access: yesIEEE Access
All new computer architectures need to be performance evaluated for acceptance and simulation is the most widely used method for evaluation of new processor designs.
Swapneel C. Mhatre, Priya Chandran
doaj   +1 more source

The Study and Evaluation of ARM-Based Mobile Virtualization

open access: yesInternational Journal of Distributed Sensor Networks, 2015
In common sense, virtualization technology is adopted to offer several isolated execution environments and make better use of computational resources in server environment.
Lei Xu, Zonghui Wang, Wenzhi Chen
doaj   +1 more source

Overview of research on trusted attestation technology of cloud virtualization platform

open access: yesTongxin xuebao, 2021
With the rapid development of cloud computing, the security issues of cloud platforms have also attracted much attention.Trusted computing is an essential supporting technology in the cloud computing security system.Trusted attestation is an important ...
Bibo TU   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy