The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Live virtual machine (VM) migration is commonly used for enabling dynamic resource or fault management, or for load balancing in datacenters or cloud platforms. A service hosted by a VM may also be migrated to prevent its visibility to an external adversary who may seek to disrupt its operation by launching a DDoS attack against it. We first show that current systems cannot adequately hide a VM migration...
The continuous evolution of the telecommunication network architecture has made their network functions to become more available and utilizable. With SDN/NFV network service providers can program their own network functions on the standard commercial hardware platform. SDN/NFV enable more efficient utilization of resources and better service agility. It supports new network services faster and less...
Virtualization technology is the foundation of Cloud services. To achieve the maximum hardware utilization, Cloud service providers usually host many guest VMs on one VM host. However, as the number of VM increases, the disk accessing performance drops significantly. Disk performance in multiple VM environment is one of the most significant problems in cloud environment. In this work, we propose a...
In this paper it was reviewed several existing investigations about minimization power consumption of data centers. It was suggested several approaches of task distribution in computing networks to minimize power consumption and management system for such networks.
The Third International Workshop on Dependability of Clouds, Data Centers, and Virtual Machine Technology (DCDV 2013) features papers covering various aspects of dependability and security in Clouds and Data Centers. Four sessions covering Cloud and Data Center Networking, Dependability Evaluation, Mobile and Cloud Computing, and Virtualization and Cloud include eleven papers.
Virtualization is around since many years in IT but in the last years it became one of the hottest topics in the field. In this paper we present our work in introducing virtualization technologies in the educational process in order to reduce costs required by hardware and software upgrades imposed by rapid evolution of technology. The courses most affected by this evolution are those that use equipment...
Virtualization and Trusted Computing are two important approaches in the information security field. How two combine them to form more powerful information security solutions deserves researching. This paper introduces how to virtulize the key components of trusted computing, including the Trusted Computing Platform, the Trust Platform Module (TPM) and the Trusted Chain, by using virtualization technology.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.