Locking the sky: a survey on IaaS cloud security

LM Vaquero, L Rodero-Merino, D Morán - Computing, 2011 - Springer
Cloud computing is expected to become a common solution for deploying applications
thanks to its capacity to leverage developers from infrastructure management tasks, thus …

Portable Desktop Applications Based on P2P Transportation and Virtualization.

Y Zhang, X Wang, L Hong - LISA, 2008 - usenix.org
Play-on-demand is usually regarded as a feasible access mode for web content (including
streaming video, web pages and so on), web services and some Software-As-A-Service …

[PDF][PDF] Cryptographic key management issues in cloud computing

A Bentajer, M Hedabou - Adv. Eng. Res, 2020 - researchgate.net
Cloud computing is a new paradigm that is gaining exponential interest in the field of
delivering IT resources in a metered manner. It also provides cost efficient architectures that …

Secure virtual disk images for grid computing

C Gebhardt, A Tomlinson - 2008 Third Asia-Pacific Trusted …, 2008 - ieeexplore.ieee.org
We present in our paper a secure, flexible and transparent security architecture for virtual
disk images. Virtual disk images are often overlooked in security concepts, especially in a …

Converting legacy desktop applications into on-demand personalized software

Y Zhang, G Su, W Zheng - IEEE Transactions on Services …, 2010 - ieeexplore.ieee.org
To access personalized software applications on demand is an attractive usage mode of
software. This paper presents such a solution based on lightweight virtualization …

[PDF][PDF] Towards trustworthy virtualisation: Improving the trusted virtual infrastructure

C Gebhardt - 2010 - Citeseer
Modern commodity platforms have become easy targets, which are increasingly plagued by
malware exploiting legacy design weaknesses. Malware often abuses the large and feature …

[PDF][PDF] Effect of readahead and file system block reallocation for lbcas

K Suzaki, T Yagi, K Iijima, NA Quynh… - Proceedings of the Linux …, 2009 - Citeseer
Disk pre-fetching, known as “readahead” of Linux kernel, arranges its coverage size by the
rate of cache hit. Fewer readaheads of large window can hide the slow I/O, especially it is …

A p2p approach to scalable network-booting

S Takada, A Sato, Y Shinjo, H Nakai… - … on Networking and …, 2012 - ieeexplore.ieee.org
Network-booting is widely adopted in universities that have to maintain many client
computers. In conventional network-booting systems, the primary bottleneck is the disk …

Trusted boot and platform trust services on 1CD Linux

K Suzaki, K Iijima, T Yagi… - 2008 Third Asia-Pacific …, 2008 - ieeexplore.ieee.org
We developed 1CD Linux which shows the benefit of trusted computing. It includes Trusted
Boot and Platform Trust Services, which use a secure chip" TPM" and are hardware rooted …

[PDF][PDF] Analysis of disk access patterns on file systems for content addressable storage

K Suzaki, K Iijima, T Yagi, C Artho - Linux Symposium, 2011 - landley.net
Abstract CAS (Content Addressable Storage) is virtual disk with deduplication, which
merges same-content chunks and reduces the consumption of physical storage. The …