Is IaaS Platform Secure?
نویسندگان
چکیده
منابع مشابه
SAFETY: A Framework for Secure IaaS Clouds
Vivek Shrivastava International Institute of Professional Studies, Devi Ahilya University, Indore-17 Email: [email protected] D. S. Bhilare Computer Centre, Devi Ahilya University, Indore-17 Email: [email protected] ----------------------------------------------------------------------ABSTRACT----------------------------------------------------------Cloud Computing is benefiting to ...
متن کاملA Secure Linux Platform
This paper describes “HP Secure OS Software for Linux” (HP-LX) – a version of Linux that incorporates modifications into the kernel to improve security. A common attack strategy is to exploit a bug in a service causing it to execute code that downloads additional executables, and overwrites existing system executables and web pages. If the attack is in the form of a “worm”, it will then probe t...
متن کاملA Secure Mobile Agents Platform
Mobile Agents is a new paradigm for distributed computing where security is very essential to the acceptance of this paradigm in a large scale distributed environment. In this paper, we propose protection mechanisms for mobile agents. In these mechanisms, the authentication of mobile agents and the access control to the system resources are controlled by the mobile-agents platform. Each agent d...
متن کاملSHAP — Secure Hardware Agent Platform
This paper presents a novel implementation of an embedded Java microarchitecture for secure, realtime, and multi-threaded applications. Together with the support of modern features of object-oriented languages, such as exception handling, automatic garbage collection and interface types, a general-purpose platform is established which also fits for the agent concept. Especially, considering rea...
متن کاملPlatform for Secure Multimedia Applications
Plasma, a platform for secure multimedia applications, allows secure communications within public networks and is particularly suited for transmitting compound multimedia documents. Using Plasma, it is possible to negotiate the cryptographic protocols to be applied before starting the communication proper. This allows communications between domains using diierent security policies which, in add...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2018
ISSN: 0975-8887
DOI: 10.5120/ijca2018918181