Effective Data Security in Virtualization using Maize Routing Technique
نویسندگان
چکیده
منابع مشابه
Virtualization Security in Data Centers and Clouds
In the past decade, with the unprecedented growth in tech companies and advances in cloud computing, it has become increasingly common for companies to incorporate virtualization in their data centers to fully utilize their hardware resources. As a result, virtualization and virtualization security have gone through major transforms in the recent years. Virtualization and its unique architectur...
متن کاملpattern recognition in maintenance data using methodologies data minitng (cade study isfahan regional power electric company)
فعالیت های نگهداری و تعمیرات اطلاعاتی را تولید می کند که می تواند در تعیین زمان های بیکاری و ارایه یک برنامه زمان بندی شده یا تعیین هشدارهای خرابی به پرسنل نگهداری و تعمیرات کمک کند. وقتی که مقدار داده های تولید شده زیاد باشند، فهم بین متغیرها بسیار مشکل می شوند. این پایان نامه به کاربردی از داده کاوی برای کاوش پایگاه های داده چندبعدی در حوزه نگهداری و تعمیرات، برای پیدا کردن خرابی هایی که موجب...
15 صفحه اولVirtualization Security
The recent form of change in working on resources and platform introduced the term virtualization. Virtualization comes with its own merits and challenges. As it hides physical characteristics of the resources and the concept of encapsulation comes into picture. Hypervisor based architecture requires fewer hardware resources and can communicate more efficiently. All major players have introduce...
متن کاملEnhancing Grid Security Using Trusted Virtualization
Grid applications have increasingly sophisticated functional and security requirements. However, current techniques mostly protect only the resource provider from attacks by the user, while leaving the user comparatively dependent on the well-behavior of the resource provider. In this paper, we take the first steps towards addressing the trust asymmetry by using a combination of trusted computi...
متن کاملEnhancing Grid Security Using Trusted Virtualization
Grid applications have increasingly sophisticated functional and security requirements. However, current techniques mostly protect only the resource provider from attacks by the user, while leaving the user comparatively dependent on the well-behavior of the resource provider. In this paper, we take the first steps towards addressing the trust asymmetry by using a combination of trusted computi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Research Journal of Applied Sciences, Engineering and Technology
سال: 2014
ISSN: 2040-7459,2040-7467
DOI: 10.19026/rjaset.8.1031