35,807 Hits in 4.8 sec

A First Step Toward Network Security Virtualization: From Concept To Prototype

Seungwon Shin, Haopei Wang, Guofei Gu
2015 IEEE Transactions on Information Forensics and Security  
In this paper we present a new concept of Network Security Virtualization (NSV), which virtualizes security resources/functions to network administrators/users, and thus maximally utilizing existing security  ...  The evaluation results show that our prototype only adds a very small overhead while providing desired network security virtualization to network users/administrators.  ...  Network Security Virtualization Concept The main concept of network security virtualization (NSV) is to virtualize network security resources/functions and provide on-demand security to any (possible)  ... 
doi:10.1109/tifs.2015.2453936 fatcat:bpga3goi3vc5hcvlu46kwmcws4

NVLab, a Networking Virtual Web-Based Laboratory that Implements Virtualization and Virtual Network Computing Technologies

M Wannous, H Nakano
2010 IEEE Transactions on Learning Technologies  
Taking a step forward toward building a Web-based laboratory, we used open source Virtualization and Virtual Network Computing technologies in NVLab, a system that offers the learners tools to draw, configure  ...  , test, and troubleshoot network designs using real Operating System instances running in the virtual mode on a host machine.  ...  However, in most cases, these laboratories served to provide training on a narrow range of computer networks concepts such as Network Security, for example.  ... 
doi:10.1109/tlt.2009.31 fatcat:cnh6payztzhmzf5xcrl77hqcvu

Trusted virtual platforms

Chris I. Dalton, David Plaquin, Wolfgang Weidner, Dirk Kuhlmann, Boris Balacheff, Richard Brown
2009 ACM SIGOPS Operating Systems Review  
This is designed to reflect all the dependencies of the virtual environment of a guest operating system.  ...  This is aimed at supporting the strong enforcement of integrity and security policy controls over a virtual entity where a virtual entity can be either a full guest operating system or virtual appliance  ...  Figure 6 shows an initial first-step towards graphics display disaggregation. Here a separate domain (Domain G) hosts a virtual frame buffer mapping component.  ... 
doi:10.1145/1496909.1496918 fatcat:3zuiuas72ncdhfmryuplb6otoe

Virtual network on demand

Dimitrios Katramatos, Sushant Sharma, Dantong Yu
2012 Proceedings of the fifth international workshop on Data-Intensive Distributed Computing Date - DIDC '12  
The VNOD project aims to build an on-demand network virtualization infrastructure that can deliver the unprecedented networking performance and quality of service required by modern, distributed, data-intensive  ...  The VNOD infrastructure described in this paper leverages these technologies to provide an environment that facilitates the establishment and management of virtual network topologies.  ...  As a first step, we have developed an early prototype that takes advantage of the TeraPaths testbed [17] .  ... 
doi:10.1145/2286996.2287006 dblp:conf/hpdc/KatramatosSY12 fatcat:66d4j6mvebg5lkjcbkertu6i5y

libNetVirt: The network virtualization library

Daniel Turull, Markus Hidell, Peter Sjodin
2012 2012 IEEE International Conference on Communications (ICC)  
It is deployed as a library, similar to libvirt in computer virtualization, with a unified interface towards the underlying network specific drivers.  ...  A common set of calls is defined to instantiate different virtual networks, using a single node view to provide the user with a suitable abstraction of the network.  ...  We go a step further, abstracting the network topology to the user providing a generic interface to interconnect his resources and simplifying even more the view towards the user.  ... 
doi:10.1109/icc.2012.6364673 dblp:conf/icc/TurullHS12 fatcat:wyvjdnugbvbn7ipqnfyytyxrxm

Discretionary Access Controls for a Collaborative Virtual Environment

Timothy Wright, Greg Madey
2010 International Journal of Virtual Reality  
In answer to this deficiency, we offer a discretionary access control (DAC) system based on traditional concepts of users and groups, and tailored to the needs of a CVE.  ...  In virtual reality games, storefronts, classrooms, and laboratories, for example, the need to control access to spaces and objects is integral to the security of activities taking place there.  ...  We choose to focus on security in the middle layer for two reasons. First, network layer security is already an area of long-standing, significant research.  ... 
doi:10.20870/ijvr.2010.9.1.2763 fatcat:hefkef2oobadnez5ltkptkdn3u

Network virtualization architecture

Gregor Schaffrath, Laurent Mathy, Christoph Werle, Panagiotis Papadimitriou, Anja Feldmann, Roland Bless, Adam Greenhalgh, Andreas Wundsam, Mario Kind, Olaf Maennel
2009 Proceedings of the 1st ACM workshop on Virtualized infrastructure systems and architectures - VISA '09  
Network virtualization provides a promising approach to enable the co-existence of innovation and reliability.  ...  We describe a network virtualization architecture as a technology for enabling Internet innovation.  ...  We would like to thank our colleagues in both projects for many fruitful discussions.  ... 
doi:10.1145/1592648.1592659 dblp:conf/sigcomm/SchaffrathWPFBGWKMM09 fatcat:4mzpnrrng5hchpvd72ooserqj4

Towards a Virtual Reality Home IoT Network Visualizer [article]

Drew Johnston, Jarret Flack, Indrakshi Ray, Francisco R. Ortega
2020 arXiv   pre-print
A prototype was developed to aid in the understanding of home IoT networks for homeowners.  ...  We present an IoT home network visualizer that utilizes virtual reality (VR). This prototype demonstrates the potential that VR has to aid in the understanding of home IoT networks.  ...  A prototype was developed with the purpose to show this proof of concept where networking students, researchers, and professional can benefit by using this type of visualization.  ... 
arXiv:2001.06579v1 fatcat:ojxzv4mlh5hnbbkyv3cfyf27na

Adaptive Distributed Virtual Computing Environment (ADViCE) [chapter]

Dongmin Kim, Salim Hariri
2001 Virtual Computing  
We also present the experimental results to evaluate the performance and e ectiveness of the the ADViCE prototype to provide three important functions: 1) Evaluation Tool: to analyze the the performance  ...  The next generation of network-centric applications will utilize a large number of computing and storage systems that are connected by global high speed networks.  ...  We h a ve successfully implemented a proof-of-concept prototype of the ADViCE architecture that provides most of the ADViCE services.  ... 
doi:10.1007/978-1-4615-1553-1_4 fatcat:lvo22vmal5da7ceb7ghdqelvfi

Virtual network stacks

Ghazi Bouabene, Christophe Jelger, Christian Tschudin
2008 Proceedings of the ACM workshop on Programmable routers for extensible services of tomorrow - PRESTO '08  
In this paper, we get inspiration from peer to peer file sharing networks to provide a new way of inter-networking.  ...  This creates RPC-like access to foreign network stacks well in line with a federation approach that avoids introducing a global overlay for integrating heterogeneous networks.  ...  The first method is that the TCP module explicitly asks the Network Sharing funtional block on node A to instantiate a virtual X stack.  ... 
doi:10.1145/1397718.1397729 dblp:conf/sigcomm/BouabeneJT08 fatcat:ksut7g4uazdbhkxotgtutc6h7m

Future Internet: Challenges in Virtualization and Federation

Dae Young Kim, Laurent Mathy, Mauro Campanella, Rick Summerhill, James Williams, Shinji Shimojo, Yasuichi Kitamura, Hideaki Otsuki
2009 2009 Fifth Advanced International Conference on Telecommunications  
Future Internet is a clean-slate research activity in quest of new networking technologies to overcome the limits of the current Internet.  ...  Visions and experiences on virtualization and federation are given by leading experts from US, EU, and Asia.  ...  ACKNOWLEDGMENT The authors would like to thank the following groups and people: all partners in the FP7 project FEDERICA (partially supported by the European Commission under the Grant Agreement No.  ... 
doi:10.1109/aict.2009.8 dblp:conf/aict/KimMCSWSKO09 fatcat:hdyygznnj5evhk443hlzm52dw4

Rebooting Virtualization Research (Again)

Alain Tchana, Renaud Lachaize
2019 Proceedings of the 10th ACM SIGOPS Asia-Pacific Workshop on Systems - APSys '19  
Finally, we propose the architecture of a research platform to explore these questions.  ...  We argue that the upcoming trends of hardware disaggregation in the data center motivate a new chapter of virtualization research.  ...  All the above-mentioned works correspond to an intermediate step towards full disaggregation.  ... 
doi:10.1145/3343737.3343746 dblp:conf/apsys/TchanaL19 fatcat:ebci6n7pznexfenam5vkoxydna

Infrastructure for Grid-Based Virtual Organizations [chapter]

L. Hluchy, O. Habala, V. D. Tran, B. Simo, J. Astalos, M. Dobrucky
2004 Lecture Notes in Computer Science  
A prototype of such an environment is deployed and tested for a flood forecasting system.  ...  This paper presents architecture of a collaborative computation environment based on a Grid infrastructure, used as a support for large scientific virtual organizations.  ...  a model to be used in each step.  ... 
doi:10.1007/978-3-540-24685-5_16 fatcat:tjghhm4eabaazivwtz2xpdwdoa

Virtual Distro Dispatcher: A Costless Distributed Virtual Environment from Trashware [chapter]

Flavio Bertini, D. Davide Lamanna, Roberto Baldoni
2007 Lecture Notes in Computer Science  
Test results are encouraging to proceed with the research towards clustering.  ...  Virtual Distro Dispatcher (VDD) is a system that produces virtual machines on a central server and projects them on a number of costless physical terminals.  ...  From there, we can open an X Server socket. Next step is to start a windows manager (e.g.  ... 
doi:10.1007/978-3-540-74742-0_22 fatcat:a5mlc4kmwvbynjatkby2m4qvb4

IoT Gateway Virtualization for 5G mMTC Network Slicing

Vasileios Theodorou, Konstantinos V. Katsaros, Christos Tranoris, Spyros Denazis
2019 Zenodo  
Based on this architecture and supporting orchestration mechanisms, we illustrate our proof of concept prototype based on open source components.  ...  We introduce a modular slicing architecture, which enables virtualization at the IoT GW level and mediated, coordinated communication with IoT devices.  ...  ACKNOWLEDGMENT This work has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 815279 (5G-VINNI).  ... 
doi:10.5281/zenodo.3466790 fatcat:ipxffin6wjec7cvjzaduqb2yba
« Previous Showing results 1 — 15 out of 35,807 results