SECURED DATA ACCESS BETWEEN TWO VIRTUAL MACHINES
نویسندگان
چکیده
منابع مشابه
Chip-Secured Data Access: Reconciling Access Rights with Data Encryption
The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today’s natural resort to Web hosting companies and Database Service Providers strongly emphasize the need for data confidentiality. Users have no other choice than trusting Web companies arguing that their systems are fully secured and th...
متن کاملChip-Secured Data Access: Confidential Data on Untrusted Servers
The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today’s natural resort to Webhosting companies strongly emphasize the need for data confidentiality. Database servers arouse user’s suspicion because no one can fully trust traditional security mechanisms against more and more frequent and...
متن کاملSecured Web Access
In ‘this paper we discuss various secured web access schemes using dynamic and static approaches. In a static approach the access environment, that is, set of authorized users, the mode of access, their access rights, etc., are predefined. This approach is suitable only for a static set up where the user requirements do not change frequently. In the dynamic approach, on the other hand, the auth...
متن کاملVirtual Data System on distributed virtual machines in computational grids
This paper presents the work of building a Grid workflow system on distributed virtual machines. A Grid Virtualization Engine (GVE) is implemented to manage virtual machines as computing resources for Grid applications. The Virtual Data System (VDS) functions as a Grid workflow engine. This paper designs and implements the Virtual Data System on distributed virtual machines, which are enabled b...
متن کاملVirtual Virtual Machines
This paper originated from a series of discussions about what will be interesting in systems research during the next five years. Systems researchers are seeing less and less scope for OS kernel hacking, network architectures and communication paradigms, which have now entered the industrial domain. In trying to answer the question “What’s left over for us?” we found that there is a lot to do, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Research in Engineering and Technology
سال: 2018
ISSN: 2321-7308,2319-1163
DOI: 10.15623/ijret.2018.0703008