Information Leakage Prevention Using Virtual Disk Drive

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Forgetful Disk Drive

Approaches to data protection have traditionally focused on physical security and/or cryptographic security, but the automatic deletion of data as a form of protection has not been widely employed. However, a vast amount of data is stored that has only a limited useful life and presents a risk to privacy and security after that time period. Approaches to data deletion can be broadly classified ...

متن کامل

Automated Disk Drive Characterization

DIXtrac is a program that automatically characterizes the performance of modern disk drives. This report describes and validates DIXtrac's algorithms, which extract accurate values for over 100 performance-critical parameters in 2 { 6 minutes without human intervention or special hardware support. The extracted data include detailed layout and geometry information, mechanical timings, cache man...

متن کامل

Disk Drive Failure Factors

Modern disk drives have become highly complex with increasing demands on high throughput, high reliability, high capacity, and low cost most of which are typically mutually exclusive. This paper takes a look at the reliability aspect of disk drives, and, more specifically, factors that cause a drive to fail. Failures fall into three main categories: hardware, software, and process. Many of the ...

متن کامل

Preventing Information Leakage from Virtual Machines’ Memory in IaaS Clouds

Infrastructure as a Service (IaaS) provides virtual machines (VMs) to the users and its system administrators often manage the user VMs using privileged VMs called the management VM. However, the administrators are not always trustworthy from users’ point of view. If the administrators allow outside attackers to intrude in the management VM, the attackers can easily steal sensitive information ...

متن کامل

Information Leakage Prevention in Emerging Technologies (MIST 2012 Volume 2)

The ICT (Information and Communication Technologies) infrastructure has been tremendously changed during the last couple of decades and the result made a big change in the computing environment. Due to this drastic advance, now we are enjoying a convenient living environment that we couldn’t have ever experienced before. In addition to this situation, the prospective emerging technologies such ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Network and Information Security

سال: 2013

ISSN: 2074-9090,2074-9104

DOI: 10.5815/ijcnis.2013.08.03