نتایج جستجو برای: virtualization

تعداد نتایج: 5116  

Journal: :CoRR 2014
Earlence Fernandes Alexander Crowell Ajit Aluri Atul Prakash

The problem of malware has become significant on Android devices. Library operating systems and application virtualization are both possible solutions for confining malware. Unfortunately, such solutions do not exist for Android. Designing mechanisms for application virtualization is a significant challenge for several reasons: (1) graphics performance is important due to popularity of games an...

2008
Thandar Thein Sung-Do Chi Jong Sou Park

Nowadays, more stringent compliance regulations, businesses of all sizes are required to implement security measures to ensure their systems and data are readily available and quickly recoverable. Virtualized clustering is inherently designed for maximum data integrity and minimal recovery time in the case of site failure. Virtualization allows multiple operating system instances to run concurr...

2013
Cong Yu Lixin Li Kui Wang Wentao Yu Chunxiao Li

Virtual machine security issues have been the focus of attention. The permissions of traditional administrative domain Dom0 are too large, so that the user's privacy is threatened. Once the attacker compromises Dom0, it can threaten the entire virtualization platform. This paper introduces a privilege separation virtual machine security model (PSVM). Dom0’s privileges are split into two parts: ...

2007
Apostol T. Vassilev

Recently, people have begun to use OS virtualization as a tool for improving LAN security. While virtualization is very useful in optimizing hardware utilization, we show that its security benefits come at a price.

2011
Sujesha Sudevalayam

Traditional data-centers are giving way to virtualization based shared hosting platforms. This requires knowledge of how much resources are required to host a set of virtualized services. Due to the resource overhead incurred by virtualization, it is essential to estimate the virtual resource usage correctly, in order to avoid inefficiency due to excessive provisioning as well as prevent perfor...

2016
Hsi - Ya Chang

Virtualization technologies are experiencing a renewed interest as a way to improve system reliability, and availability, reduce costs, and provide flexibility. This paper presents the development on leverage existing cloud infrastructure and virtualization tools. We adopted some virtualization technologies which improve portability, manageability and compatibility of applications by encapsulat...

2016
Björn Franke

General rights Copyright for the publications made accessible via the Edinburgh Research Explorer is retained by the author(s) and / or other copyright owners and it is a condition of accessing these publications that users recognise and abide by the legal requirements associated with these rights. Take down policy The University of Edinburgh has made every reasonable effort to ensure that Edin...

2016
Björn Franke

General rights Copyright for the publications made accessible via the Edinburgh Research Explorer is retained by the author(s) and / or other copyright owners and it is a condition of accessing these publications that users recognise and abide by the legal requirements associated with these rights. Take down policy The University of Edinburgh has made every reasonable effort to ensure that Edin...

Journal: :JNW 2012
Md. Motaharul Islam Eui-nam Huh

Wireless Sensor Networks (WSNs) are gaining importance for their broad range of commercial applications such as in home automation, health-care and industrial automation. In these applications multi-vendor and heterogeneous sensor nodes are deployed. Due to strict administrative control over the WSN domains, communication barrier, conflicting goal & economic interest of different vendors of sen...

2010
Dale L. Lunsford

Information systems educators must balance the need to protect the stability, availability, and security of computer laboratories with the learning objectives of various courses. In advanced courses where students need to install, configure, and otherwise manipulate application and operating system settings, this is especially problematic as these activities threaten the stability of workstatio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید