نتایج جستجو برای: virtualization
تعداد نتایج: 5116 فیلتر نتایج به سال:
The problem of malware has become significant on Android devices. Library operating systems and application virtualization are both possible solutions for confining malware. Unfortunately, such solutions do not exist for Android. Designing mechanisms for application virtualization is a significant challenge for several reasons: (1) graphics performance is important due to popularity of games an...
Nowadays, more stringent compliance regulations, businesses of all sizes are required to implement security measures to ensure their systems and data are readily available and quickly recoverable. Virtualized clustering is inherently designed for maximum data integrity and minimal recovery time in the case of site failure. Virtualization allows multiple operating system instances to run concurr...
Virtual machine security issues have been the focus of attention. The permissions of traditional administrative domain Dom0 are too large, so that the user's privacy is threatened. Once the attacker compromises Dom0, it can threaten the entire virtualization platform. This paper introduces a privilege separation virtual machine security model (PSVM). Dom0’s privileges are split into two parts: ...
Recently, people have begun to use OS virtualization as a tool for improving LAN security. While virtualization is very useful in optimizing hardware utilization, we show that its security benefits come at a price.
Traditional data-centers are giving way to virtualization based shared hosting platforms. This requires knowledge of how much resources are required to host a set of virtualized services. Due to the resource overhead incurred by virtualization, it is essential to estimate the virtual resource usage correctly, in order to avoid inefficiency due to excessive provisioning as well as prevent perfor...
Virtualization technologies are experiencing a renewed interest as a way to improve system reliability, and availability, reduce costs, and provide flexibility. This paper presents the development on leverage existing cloud infrastructure and virtualization tools. We adopted some virtualization technologies which improve portability, manageability and compatibility of applications by encapsulat...
General rights Copyright for the publications made accessible via the Edinburgh Research Explorer is retained by the author(s) and / or other copyright owners and it is a condition of accessing these publications that users recognise and abide by the legal requirements associated with these rights. Take down policy The University of Edinburgh has made every reasonable effort to ensure that Edin...
General rights Copyright for the publications made accessible via the Edinburgh Research Explorer is retained by the author(s) and / or other copyright owners and it is a condition of accessing these publications that users recognise and abide by the legal requirements associated with these rights. Take down policy The University of Edinburgh has made every reasonable effort to ensure that Edin...
Wireless Sensor Networks (WSNs) are gaining importance for their broad range of commercial applications such as in home automation, health-care and industrial automation. In these applications multi-vendor and heterogeneous sensor nodes are deployed. Due to strict administrative control over the WSN domains, communication barrier, conflicting goal & economic interest of different vendors of sen...
Information systems educators must balance the need to protect the stability, availability, and security of computer laboratories with the learning objectives of various courses. In advanced courses where students need to install, configure, and otherwise manipulate application and operating system settings, this is especially problematic as these activities threaten the stability of workstatio...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید