Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper, we describe an architecture for high-speed storage nodes intended for supporting cloud-based storage I/O intensive applications such as file servers, backup servers and databases. The nodes can host multiple virtual machines each having direct access to a storage array via Single Route I/O Virtualization (SR-IOV). This is done in a way which does not compromise security. We demonstrate...
A secure and trusted execution environment is a fundamental requirement for distributed network, so that the integrity of service provider platform should be verified prior to services' distribution in order to assure that the platform is free from a malicious modification and attack. In this paper, we proposed an implementation of trusted execution environment based on the combination of trusted...
Virtualization has been widely used in cloud computing systems to cut costs, and to provide dynamically scalable resources over the internet. Many ideas have been proposed to increase the security of the virtualized systems. But, a big unspoken assumption of these ideas is that the cloud users have to trust the cloud provider totally and unconditionally. In reality, however, this assumption can't...
Cerberus is a tiny x86 virtual machine monitor. It allows security sensitive codes to be executed in an isolated circumstance. The codes could attest their integrity to a remote party by a two-step attestation provided by Cerberus. Cerberus does not require the security sensitive applications to be modified or recompiled to run on it. These applications are packaged with the operating systems as virtual...
With the development of the computer technology, the virtual machine has been become the main research topic. Understanding of the current technology and future trends of virtual machine system greatly help to improve the service performance of system. Therefore, we describe the current technology and present the future trends of virtual machine system in the paper. In the current technology of virtual...
Virtual machine introspection (VMI) describes the method of monitoring and analyzing the state of a virtual machine from the hypervisor level. Using knowledge of the virtual hardware architecture, it is possible to derive information about a guest operating system's state from the virtual machine state. We argue that by deriving this information it is possible to build VMI applications which are more...
The Scientific Bytecode Virtual Machine is a virtual machine designed specifically for performance, security, and portability of scientific applications deployed in a Grid environment. The performance overhead normally incurred by virtual machines is mitigated using native optimized scientific libraries, security is obtained by sandboxing techniques. Lastly, by executing platform-independent bytecodes,...
Java is dominating in object-oriented computing. However, Java relies on Java Virtual Machine to process Java bytecodes, such that it imposes large overhead on the embedded system. In addition, as security is always a major concern in most of the networked computer systems, embedded systems should provide security features to defend against attacks. Many viruses use the security loopholes to trigger...
Partitioned software architectures were conceived to fulfill security and avionics requirements where predictability is extremely important. Both, the availability of new processors and an increased necessity of security, have opened new possibilities to use efficiently this approach. Avionic industry has consolidated the Integrated Modular Avionics (IMA) as a solution to manage the software growth...
Within the last few years attacks against IT systems have reached an alarming number. Since these systems are applied in more and more application fields the arising financial damage is tremendous. The Trusted Computing (TC) approach of the Trusted Computing Group (TCG) should ensure that a system is permanently in a well-defined and trustworthy state. However the TCG only defines the components necessary...
We argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification With analysis of limitations Trusted Computing Group (TCG) has encountered. Putting together the VMM architecture, TCG hardware and application-oriented ldquothinrdquo virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and...
Problems of overall safety management, appropriate load balance, and the need for easy-to-use emerge in an environment containing multiple trusted virtualized platforms. We proposed the generalized trusted virtualized platform architecture, GTVP, which combines multiple physical platforms as a trusted union. GTVP first establishes trust relationship among all platforms, and then synchronizes their...
We present the design of a trusted platform module (TPM) that supports hardware-based virtualization techniques. Our approach enables multiple virtual machines to use the complete power of a hardware TPM by providing for every virtual machine (VM) the illusion that it has its own hardware TPM. For this purpose, we introduce an additional privilege level that is only used by a virtual machine monitor...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.