Bulut bilişimde güvenlik zafiyetleri, tehditleri ve bu tehditlere yönelik güvenlik önerileri

İK AKSAKALLI - Uluslararası Bilgi Güvenliği Mühendisliği Dergisi, 2019 - dergipark.org.tr
Bulut bilişim, yeni çağı simgeleyen paralel hesaplama, dağıtık hesaplama ve sanallaştırma
teknolojilerinin gelişimidir. Bu teknoloji, talep üzerine internet altyapısına inşa edilip bulut …

An improved vTPM-VM live migration protocol

P Fan, B Zhao, Y Shi, Z Chen, M Ni - Wuhan University Journal of Natural …, 2015 - Springer
To prevent malicious virtual machine from harming the security of vTPM-VM live migration
process, we propose an improved vTPM-VM live migration protocol which uses a TPM …

Physical attack protection with human-secure virtualization in data centers

J Szefer, P Jamkhedkar, YY Chen… - IEEE/IFIP International …, 2012 - ieeexplore.ieee.org
Cloud computing-based data centers, which hold a large amount of customer data, are
vulnerable to physical attacks and insider threats. Current protection and defense …

A simulator for analysis of opportunistic routing algorithms

C Chilipirea, AC Petre, C Dobre, F Pop… - … on Parallel and …, 2015 - ieeexplore.ieee.org
When mobile devices are unable to establish direct communication, or when communication
should be offloaded to cope with large throughputs, mobile collaboration can be used to …

Probing the Scheduling Algorithms in the Cloud Based on OpenStack

Y Luo, Q Shen, C Li, K Chen, Z Wu - … 2015, Nan**g, China, August 13-15 …, 2015 - Springer
Among modern cloud infrastructures, live migration of virtual machines offers many
advantages like scalability and elasticity but also leads to risks in the meantime. Security …

[การอ้างอิง][C] 一种基于 XEN **台的可信虚拟机迁移协议

刘明芳, **文锋, 赵阳 - 计算机安全, 2013

[การอ้างอิง][C] A brief tutorial on live virtual machine migration from a security perspective

D Perez-Botero - University of Princeton, USA, 2011