نتایج جستجو برای: virtualization
تعداد نتایج: 5116 فیلتر نتایج به سال:
In this manuscript, the cloud computing and its security issues have been demonstrated in case of Network virtualization process. Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). Cloud co...
Virtualization tools can be an alternative to implement networking scenarios, with the purpose of making measurement experiments similar to those in real networks. For this, it is important to use the virtualization tool that consumes fewer resources. In this work, we have obtained a quantitative comparison of the CPU and memory consumption of those virtualization tools during the boot up and e...
The core services in cloud computing environment are SaaS (Software as a Service), Paas (Platform as a Service) and IaaS (Infrastructure as a Service). Among these three core services server virtualization belongs to IaaS and is a service technology to reduce the server maintenance expenses. Normally, the primary purpose of sever virtualization is building and maintaining a new well functioning...
Virtualization Mechanisms for Mobility, Security and System Administration Shaya Potter This dissertation demonstrates that operating system virtualization is an effective method for solving many different types of computing problems. We have designed novel systems that make use of commodity software while solving problems that were not conceived when the software was originally written. We sho...
To approach the ever growing complexity of modern malware, security applications increasingly leverage virtualization technology to perform Virtual Machine Introspection (VMI). VMI constitutes techniques that allow the observation, analysis, and control of guest Virtual Machines (VMs) from the outside. This lends VMI-based applications an omniscient character gaining a complete and untainted vi...
The Internet is currently facing many new challenges that require fundamental changes in network architecture and service models. However the current Internet lacks the flexibility to adopt innovations in network architecture and service provisioning. To fend off this ossification, network virtualization has been propounded as a key attribute of the future inter-networking paradigm and is expec...
This paper describes an enhanced side-channel analysis method to detect hardware virtualization based rootkits, by detecting performance degradation caused by the hardware virtualization itself. The method proposed is, (like a network intrusion detection system), both passive and remote, so it is not easily detected by the rookit. The method does not rely on an internal and therefore untrustabl...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید