نتایج جستجو برای: virtualization

تعداد نتایج: 5116  

2014
Sumit Kumar Sumeer Kumar

In this manuscript, the cloud computing and its security issues have been demonstrated in case of Network virtualization process. Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). Cloud co...

2007
Walter M. Fuertes Jorge E. López de Vergara

Virtualization tools can be an alternative to implement networking scenarios, with the purpose of making measurement experiments similar to those in real networks. For this, it is important to use the virtualization tool that consumes fewer resources. In this work, we have obtained a quantitative comparison of the CPU and memory consumption of those virtualization tools during the boot up and e...

Journal: :JIPS 2010
Sung-Jin Baek Sun-Mi Park Su-Hyun Yang Eun-Ha Song Young-Sik Jeong

The core services in cloud computing environment are SaaS (Software as a Service), Paas (Platform as a Service) and IaaS (Infrastructure as a Service). Among these three core services server virtualization belongs to IaaS and is a service technology to reduce the server maintenance expenses. Normally, the primary purpose of sever virtualization is building and maintaining a new well functioning...

2010
Shaya Potter

Virtualization Mechanisms for Mobility, Security and System Administration Shaya Potter This dissertation demonstrates that operating system virtualization is an effective method for solving many different types of computing problems. We have designed novel systems that make use of commodity software while solving problems that were not conceived when the software was originally written. We sho...

2016
Sergej Proskurin

To approach the ever growing complexity of modern malware, security applications increasingly leverage virtualization technology to perform Virtual Machine Introspection (VMI). VMI constitutes techniques that allow the observation, analysis, and control of guest Virtual Machines (VMs) from the outside. This lends VMI-based applications an omniscient character gaining a complete and untainted vi...

Journal: :JCM 2012
Qiang Duan

The Internet is currently facing many new challenges that require fundamental changes in network architecture and service models. However the current Internet lacks the flexibility to adopt innovations in network architecture and service provisioning. To fend off this ossification, network virtualization has been propounded as a key attribute of the future inter-networking paradigm and is expec...

2010
Iain Kyte Pavol Zavarsky Dale Lindskog Ron Ruhl

This paper describes an enhanced side-channel analysis method to detect hardware virtualization based rootkits, by detecting performance degradation caused by the hardware virtualization itself. The method proposed is, (like a network intrusion detection system), both passive and remote, so it is not easily detected by the rookit. The method does not rely on an internal and therefore untrustabl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید