The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Virtualization has been widely used in cloud computing systems to cut costs, and to provide dynamically scalable resources over the internet. Many ideas have been proposed to increase the security of the virtualized systems. But, a big unspoken assumption of these ideas is that the cloud users have to trust the cloud provider totally and unconditionally. In reality, however, this assumption can't...
The application of network computing technology, more and more widely, its security is particularly important to the emergence of trusted computing research for the security of network computing application technology research has provided new opportunities. In this paper, the credibility of Web-based computing environment, the structure of thought and its implementation model.
Increase in emphasis on risk management allows for better enterprise IT risk management. Early risk identification and assessment ensures effective risk management steps are formulated. The formulation and sustenance of an IT risk management framework is one of the critical and challenging tasks of modern corporate enterprise risk management. The existence of a risk assessment tool allows for effective...
In the trusted computing platform, trust is typically established solely based on software measurements. Few works consider the trust of platform hardware. However, hardware trust is pretty important to a trusted computing platform. In this paper, we propose the notion of measuring hardware trust and introduce the defintion of hardware integrity measurement, which is similar to the software integrity...
Virtualization technologies have been explored to mitigate the vulnerabilities in the current TCG architecture. But only a small number of efforts address the handling of the detected TCG TOCTOU attacks. This paper aims to defeat TCG TOCTOU attacks occurring in Xen hardware virtual machines. We propose an efficient response approach (ERA) in the environment of the Xen virtual machine monitor and the...
We design and implement a Mandatory Access Control (MAC) system in distributed virtual computing environment, named DVM-MAC, aiming to provide distributed trust through enforcing MAC policies. In DVM-MAC, Prioritized Chinese Wall (PCW) model is implemented to control potential covert channels between VMs in both single node and distributed environment. A policy enforcement module locates inside Xen...
Multi-cipher and multi-mode cryptosystems are widely used for hardware acceleration in modern security protocols. In a session of communication, these protocols can only use an algorithm along with its operation mode. The switching of cipher algorithms and operation modes can occur between sessions of communication. This paper introduces a multi-cipher cryptosystem (MCC) which enables a cryptosystem...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.