The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud service providers (CSPs) should institute the necessary security controls, including restricting physical and logical access to hyper visor and other forms of employed virtualization layers. To enact relevant security measures, the core elements communicating with the hyper visor need to be secured. A proposed security model will introduce some of the aspects that need to be secured in the virtual...
Practical experience is considered a vital part of university level courses in Information Technology (IT). A practical component of computer networking related courses, at the application level, requires multiple servers to be studied by the students. Many of such servers may be incompatible with each other and it may be required that they be installed on different platforms. This issue leads to...
Virtualization is a term that refers to the abstraction of computer resources. The purpose of virtual computing environment is to improve resource utilization by providing a unified integrated operating platform for users and applications based on aggregation of heterogeneous and autonomous resources. More recently, virtualization at all levels (system, storage, and network) became important again...
The virtualization technology has been developed rapidly with the growth of the hardware supported virtualization technologies and the appearance of the various services. Many researchers are concentrating on developing the virtualization technologies which are recognized as the most significant core technology of the IT applications such as green IT and cloud computing. The major processor companies...
This work analyses the performance of Hadoop, an implementation of the MapReduce programming model for distributed parallel computing, executing on a virtualisation environment comprised of 1 + 16 nodes running the VMWare workstation software. A set of experiments using the standard Hadoop benchmarks has been designed in order to determine whether or not significant reductions in the execution time...
Anti-debugging technique is widely used to protect executable files in commercial software applications. However, most of contemporary anti-debugging products fail to guarantee their functionalities in that when the application code is running on Ring 0 or above, malicious attackers can still manipulate it to block the anti-debugging process. This paper introduces an anti-debugging framework based...
The PrivacyCA defined in Trusted Computing Group (TCG) specifications may be the performance bottleneck of trusted applications, because it needs to be involved in every transaction of attestation to maximize privacy and in a future trust-enabled Internet a PrivacyCA potentially has to serve millions of customers. In this paper we show how the scalability of PrivacyCA can be improved. In this context,...
The complexity of modern data centers has evolved significantly in recent years. One typically is comprised of a large number and types of middleware and applications that are hosted in a heterogeneous pool of both physical and virtual servers, connected by a complex web of virtual and physical networks. Therefore, to manage everything in a data center, system administrators usually need a plethora...
This paper addresses a personalized virtual machine based on users schedule event by dividing computing resources and combining them into a virtual computer. As the beginning approach towards one of solutions for the personalized virtual computing, we propose the architecture that users events are translated to the users task and the task comes to the factor for reconfiguring virtual machine. Finally,...
Virtualization is a promising technology that has attracted much attention, particularly in the grid community. Recent advances using virtualization technologies enable multiplexing the physical resources by means of virtual machines resulting in better resource utilization. We have proposed virtual cluster development environment (VCDE) to dynamically form virtual cluster on demand providing the...
The steady increase in performance of the processors commonly adopted for real-time systems leads to the opportunity of hosting diverse classes of tasks on the same hardware, for example real-time control tasks and a man-machine interface, each one under the control of its own operating system. This paper describes how an asymmetric virtualisation layer has been realised on top of the ARM TrustZone...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.