The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Virtualization is becoming an increasingly popular service hosting platform. Recently, intrusion detection systems (IDSs) which utilize virtualization have been introduced. One particular challenge present in current virtualization-based IDS systems is considered in this paper. IDS systems are commonly faced with high-dimensionality imbalanced data. Improved feature selection methods are needed to...
With the number of applications running upon the virtualized system increased, the virtual network circumstance becomes more and more complicated; the consequent security problems thereby have been a concern for industrial and academic fields. However, the current solutions are mostly confined to the enforcement of several patchy-works on system which still requires proficient hacking skills for administrators...
Clouds are complex systems subject to an increasing number of anomalies and threats. In this paper we briefly revisit the issues related to Windows guest cloud service resilience and later provide some preliminary results on the resilience of Windows cloud guests via virtualization. In particular, we propose an architecture, Cloud Resilience for Windows (CReW). CReW can transparently monitor guest...
Containment of application execution is a key security feature of operating systems. Without strong containment, an attacker who compromises one process may take control of the whole machine. Virtualization technology has been widely used in server systems to strongly isolate various applications or services in different virtual machines; its usage in desktop systems which are much more interactive...
This paper describes the mechanism of the object sharing in Java Card and analysis of the existed security problems which lead to the attack, at same time it puts forward two methods to solve the attack. By comparing and analyzing the two methods, we will develop more protecting mechanism to protect the security of Java Card.
Desktop virtualization is a new delivery method in which desktop operating systems execute in a data center and users access their applications using stateless "thin-client" devices. This paradigm promises significant benefits in terms of data security, flexibility, and reduction of the total cost of ownership. It is important to further improve this approach while maintaining good user...
As Information Security Professionals we are often thought of as the individuals who implement the necessary technologies to protect the organization. Sometime as InfoSec professionals we are too paranoid about security that we tend to bend over backwards to protect information at ANY cost. Cost is a delineating factor in the protecting the confidentially, integrity and availability of information...
Much research aiming to design practical algorithms to support Byzantine Fault-Tolerant distributed applications has been made in recent years. These solutions are designed to make the applications resistant to successful attacks against the system, thereby making services tolerant to intrusions. Recently, some of these studies have considered the use of virtual machines for building a trusted computing...
Protective measures for server invasions should not solely focus on events before an invasion occur. Recording and monitoring successful server invasions with endless streams of security mechanisms should be employed attentively to reduce the loss of data due to successful intrusion attacks on any system. Overlooking this will inevitably lead to detrimental data loss and stray away from the key issue...
Desktop Grids harvest the computing power of idle desktop computers whether these are volunteer or deployed at an institution. Allowing foreign applications to run on these resources requires the sender of the application to be trusted, but trust in goodwill is never enough. An efficient solution is to provide a secure isolated execution environment ("sandbox"), which does not constrain...
A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. These objectives require a strategy for reducing the costs, minimizing the risks, and enabling an agile management system. But existing solutions often focus on the unsustainable infrastructures that consumes IT resources...
Virtual desktop environment (VDE) provides a real virtual working environment in which users could personally customize and update the application list from application template libraries. The heterogeneous applications actually running in the remote application servers could cooperatively communicate with each other. It is a thin client approach to mobility in which the perfect combination of VM...
Desktop virtualization is a new delivery method in which desktop operating systems execute in a data center and users access their applications using stateless ??thin-client?? devices. This paradigm promises significant benefits in terms of data security, flexibility, and reduction of the total cost of ownership. However, in order to further optimize this approach while maintaining good user experience,...
Sharing data within grid environments always results in losing control over data usage. If the shared information is medical data, this violates laws as specified in HIPAA, because access to such data must be reconstructible and needs to be tightly controlled. To comply with these regulations it must be guaranteed, that each data access and modification is recorded to produce audit trails. The provided...
Using root of trust to build trusted computing platforms is a hot spot of information security research nowadays. According to trusted computing, this paper implements transitive trust in Java environment and builds a trusted Java platform. Malicious Java programs are resisted, and Java applications are managed and controlled by a trusted Java platform that only load and run trustworthy Java programs.
Desktop virtualization is a new computing approach to application delivery and management. It leverages OS virtualization and remoting protocols to provide users with remote access to virtual machines running in a centralized data center. It promises significant benefits in terms of improved data security, reduced management complexity, and more efficient and flexible resource usage. However, it brings...
Necessity is the mother of invention, and necessity has produced many software and hardware tools in the realm of computer networking and security to overcome problems encountered in the private and public sector. Unconventionally installed operating systems including virtual machines, operating systems installed on removable media and external storage drives are some recent inventions. These tools...
Increasingly, web applications handle sensitive data and interface with critical back-end components, but are often written by poorly experienced programmers with low security skills. The majority of vulnerabilities that affect web applications can be ascribed to the lack of proper validation of user's input, before it is used as argument of an output function. Several program analysis techniques...
Many institutions are currently investigating the feasibility of creating Computer Security Laboratory environments for their researchers and students. This paper compares four of the current isolated and remote access labs that institutions could use as models to minimize the effort required to create or access a working computer security lab without investing the years of effort that the original...
A concern about personal information confidentiality typically arises when any desktop application communicates to the external network, for example, to its producer's server for obtaining software version updates. We address this confidentiality concern of end users by an approach called shadow execution. A key property of shadow execution is that it allows applications to successfully communicate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.