Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Improving Xen security through disaggregation
Virtual machine monitors (VMMs) have been hailed as the basis for an increasing number of
reliable or trusted computing systems. The Xen VMM is a relatively small piece of software …
reliable or trusted computing systems. The Xen VMM is a relatively small piece of software …
Trusted Computing vs. Advanced Persistent Threats: Can a defender win this game?
As both the number and the complexity of cyber attacks continuously increase, it is
becoming evident that traditional security mechanisms have limited success in detecting …
becoming evident that traditional security mechanisms have limited success in detecting …
Method and apparatus for migrating virtual trusted platform modules
VR Scarlata - US Patent 8,074,262, 2011 - Google Patents
BACKGROUND A conventional processing system may include hardware resources, such
as a central processing unit (CPU) and ran dom access memory (RAM), as well as Software …
as a central processing unit (CPU) and ran dom access memory (RAM), as well as Software …
Collabra: a xen hypervisor based collaborative intrusion detection system
S Bharadwaja, W Sun, M Niamat… - 2011 Eighth …, 2011 - ieeexplore.ieee.org
In this paper, we introduce Collabra, a distributed intrusion detection platform based on Xen
hyper visors to maintain the security of the cloud based on virtualized network. While the …
hyper visors to maintain the security of the cloud based on virtualized network. While the …
Security-preserving live migration of virtual machines in the cloud
Hypervisor-based process protection is a novel approach that provides isolated execution
environments for applications running on untrusted commodity operating systems. It is …
environments for applications running on untrusted commodity operating systems. It is …
PALM: security preserving VM live migration for systems with VMM-enforced protection
Live migration of virtual machine (VM) is a desirable feature for distributed computing such
as grid computing and recent cloud computing by facilitating fault tolerance, load balance …
as grid computing and recent cloud computing by facilitating fault tolerance, load balance …
Diverter: A new approach to networking within virtualized infrastructures
A Edwards, A Fischer, A Lain - Proceedings of the 1st ACM workshop on …, 2009 - dl.acm.org
As virtualized data-centres become the back-end platforms behind a new generation of
utility and cloud computing infrastructures (such as AmazonAWS [1]) their multi-tenancy …
utility and cloud computing infrastructures (such as AmazonAWS [1]) their multi-tenancy …
Trusted Virtual Domains–design, implementation and lessons learned
Abstract A Trusted Virtual Domain (TVD) is a coalition of virtual machines and resources (eg,
network, storage) that are distributed over multiple physical platforms and share a common …
network, storage) that are distributed over multiple physical platforms and share a common …
Trusted computing: Security and applications
E Gallery, CJ Mitchell - Cryptologia, 2009 - Taylor & Francis
The main objective of this paper is to highlight some of the major security and application
issues confronting trusted computing technology. This technology—now present in a large …
issues confronting trusted computing technology. This technology—now present in a large …
Enhancing data privacy and integrity in the cloud
J Naruchitparames, MH Güneş - … International Conference on …, 2011 - ieeexplore.ieee.org
Cloud computing is a new computing paradigm in which dynamically scalable resources are
provided as a service over the Internet. One central concern in cloud computing is the …
provided as a service over the Internet. One central concern in cloud computing is the …