The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The EU funded FP7 project T-NOVA, with the specific goal of accelerating the evolution of NFV, proposes an open architecture to provide Virtual Network Functions as a Service (VNFaaS), together with a dynamic, and flexible platform for the management of Network Services (NSs) composed by those Virtual Network Functions (VNFs). The proposed architecture allows operators to deploy distinct virtualized...
This paper presents a computing hosting system to provide virtual computing laboratories for learning activities is presented. This system has a distributed structure and it is based on clustering, hosting and virtualization technologies. All the components used in its development are free software tools. The computing lab model provided by the system is a more sustainable and scalable alternative...
Virtualization of embedded systems has recently been in the spotlight especially because of the numerous advantages it can bring. Among these, the improvement of software design quality can be highlighted, since legacy software can be reused along with newer applications, easing newer and older systems' integration. Also, security concerned systems can enjoy the gains of virtualization: two Operating...
Information availability is crucial for business continuity and enterprise level service provisioning. Maintaining information flow without compromising Confidentiality, Integrity, and Availability is a major task for the Information Technology Managers. Besides this, the dependability on Information has increased exponentially which requires highly complex Data Centers, which in turn become a huge...
Sequential or single-threaded programming is already a complicated task. The shift to multithreaded programming only increases complexity, cost and code of the program and moreover increases the effort required for debugging, to avoid deadlocks, race conditions and other problems associated with the parallel programs. In this paper we present a comprehensive evaluation methodology to benchmark the...
A secure and trusted execution environment is a fundamental requirement for distributed network, so that the integrity of service provider platform should be verified prior to services' distribution in order to assure that the platform is free from a malicious modification and attack. In this paper, we proposed an implementation of trusted execution environment based on the combination of trusted...
As a most prevalent topic in recent few years, the public has shown great interest on cloud computing - the brand new concept about service pattern for IT industry. However, the public view is now mainly focused on the technical development of such a framework that is practically available, yet little research has been taken from the aspect of the academic. This article is written with the intention...
With the popularity of virtualization, the problem that how to manage hundreds even thousands of virtual machines running on multiple physical computing nodes becomes important. Current virtual machine management systems only can obtain basic information of virtual machines and execute simple operations on them, such as start, reboot and shutdown. In this paper, we design a virtual machine management...
With the resurgent interest in virtualisation, router virtualisation seems the next step to servers virtualisation. It is also a key in deploying flexible and isolated virtual networks. In this paper, we evaluate Xen-based virtual routers on top of commodity hardware. Forwarding being achieved through the driver domain networking model, we identify and analyze the throughput limitation through profiling...
Virtualization technology improves the resource utilization, but also raises the probability of resource contention. Thus, it arises one problem, namely how about performance isolation among VMs. To answer the question, benchmarks are highly required to evaluate performance isolation. However, few benchmarks to give solutions to the problem are available. Especially, there does not exist a micro-benchmark...
This paper presents a critical comparison of a virtualised data centre infrastructure and an infrastructure that consists of physical servers. Our investigation shows how virtualisation can better utilise the hardware and consequently reduce the power consumption and carbon emissions. The case study reports an extensive research phase to identify main reasons for data centre virtualisation. The data...
Virtualization technologies have been explored to mitigate the vulnerabilities in the current TCG architecture. But only a small number of efforts address the handling of the detected TCG TOCTOU attacks. This paper aims to defeat TCG TOCTOU attacks occurring in Xen hardware virtual machines. We propose an efficient response approach (ERA) in the environment of the Xen virtual machine monitor and the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.