SECURED DATA ACCESS BETWEEN TWO VIRTUAL MACHINES

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Chip-Secured Data Access: Reconciling Access Rights with Data Encryption

The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today’s natural resort to Web hosting companies and Database Service Providers strongly emphasize the need for data confidentiality. Users have no other choice than trusting Web companies arguing that their systems are fully secured and th...

متن کامل

Chip-Secured Data Access: Confidential Data on Untrusted Servers

The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today’s natural resort to Webhosting companies strongly emphasize the need for data confidentiality. Database servers arouse user’s suspicion because no one can fully trust traditional security mechanisms against more and more frequent and...

متن کامل

Secured Web Access

In ‘this paper we discuss various secured web access schemes using dynamic and static approaches. In a static approach the access environment, that is, set of authorized users, the mode of access, their access rights, etc., are predefined. This approach is suitable only for a static set up where the user requirements do not change frequently. In the dynamic approach, on the other hand, the auth...

متن کامل

Virtual Data System on distributed virtual machines in computational grids

This paper presents the work of building a Grid workflow system on distributed virtual machines. A Grid Virtualization Engine (GVE) is implemented to manage virtual machines as computing resources for Grid applications. The Virtual Data System (VDS) functions as a Grid workflow engine. This paper designs and implements the Virtual Data System on distributed virtual machines, which are enabled b...

متن کامل

Virtual Virtual Machines

This paper originated from a series of discussions about what will be interesting in systems research during the next five years. Systems researchers are seeing less and less scope for OS kernel hacking, network architectures and communication paradigms, which have now entered the industrial domain. In trying to answer the question “What’s left over for us?” we found that there is a lot to do, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Research in Engineering and Technology

سال: 2018

ISSN: 2321-7308,2319-1163

DOI: 10.15623/ijret.2018.0703008