530 Hits in 3.4 sec

Privileged operations in the PlanetLab virtualised environment

Steve Muir, Larry Peterson, Marc Fiuczynski, Justin Cappos, John Hartman
2006 ACM SIGOPS Operating Systems Review  
We introduce Proper, a service running on the Planet-Lab system, that allows unprivileged entities to access privileged operations in a safe, tightly controlled manner.  ...  We describe how implementing such a system in a traditional UNIX environment is non-trivial, and provide a number of examples of how services running on PlanetLab actually use Proper.  ...  In many of those systems a Proper-like mechanism is used to allow the OS running in the virtualised environment to bypass virtualisation in a controlled manner and obtain direct access to certain elements  ... 
doi:10.1145/1113361.1113375 fatcat:74pgjsla2fgx3jyb4ka4qr2dky

Virtual machine security

Arif Khan
2017 International Journal of Information and Computer Security  
We have depicted how those threats affect the deployment of a VM in the cloud computing. Proper techniques to construct a novel defense mechanism for virtualisation have also been discussed.  ...  In the present article we have described the security of the virtual machine (VM). The virtual environment is not fully risk-proof.  ...  It may even break encryption and cryptographic protocols. • Diversity: In the virtualised environment, many VMs run with a wide range of operating systems.  ... 
doi:10.1504/ijics.2017.082839 fatcat:dofaglbmijf3dkoypcyhf3t3ym

A methodology for testing virtualisation security

Scott Donaldson, Natalie Coull, David McLuskie
2017 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)  
For each of the three platforms tested, the virtualised operating system revealed information which demonstrated that they were in a virtualised environment.  ...  INTRODUCTION Virtualisation involves isolating the operating system (OS) in a virtual machine (VM) which enables the virtual layer to present hardware to the guest operating systems running on top.  ... 
doi:10.1109/cybersa.2017.8073397 dblp:conf/cybersa/DonaldsonCM17 fatcat:z25x6ql3gjbttk5ao7zyget564

Web Server Performance Evaluation in a Virtualisation Environment

Manjur Kolhar
2017 International Journal of Advanced Computer Science and Applications  
Operational and investment costs are reduced by resource sharing in virtual machine (VM) environments, which also results in an overhead for hosted services.  ...  Therefore, this study focuses on measuring the performance of a web server under a virtual environment and comparing those results with that from a dedicated machine.  ...  Furthermore, virtualisation allows a cloud service provider (CSP) to run multiple operating systems using a VM over a single hardware system, which reduces operating and investment costs.  ... 
doi:10.14569/ijacsa.2017.080210 fatcat:5av2aelqsvfi5crijr5zxcwe7e

Taxonomy of Cloud Security

Sanchika Gupta, Padam Kumar
2013 International Journal of Computer Science Engineering and Applications  
It also provides access mobility, easier maintenance, scalabilityand operability in terms of its management and usage.  ...  is a critical problem that needs urgent attention.This articlefocuses on a taxonomy of possible attacks on a Cloud environment and a taxonomy of the defence .The attack taxonomy describes existing threats  ...  This can occur in a virtualised system that does not validate the hypervisor integrity as a regular process.  ... 
doi:10.5121/ijcsea.2013.3505 fatcat:laoqx3yeazah7blsprybzc3ofi

Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments [chapter]

Vassilios Vassilakis, Emmanouil Panaousis, Haralambos Mouratidis
2016 Lecture Notes in Computer Science  
As security will be a fundamental enabling factor of small cell as a service (SCaaS) in 5G networks, we present the most prominent threats and vulnerabilities against a broad range of targets.  ...  Research on next-generation 5G wireless networks is currently attracting a lot of attention in both academia and industry.  ...  The present work has been performed in the scope of the SESAME ( Small cEllS coordinAtion for Multi-tenancy and Edge services) European Research Project and has been supported by the Commission of the  ... 
doi:10.1007/978-3-319-45931-8_5 fatcat:3mft6bekkzbt7krasbyacvr2zy

Performance Comparison and Tuning of Virtual Machines For Sequence Alignment Software

Zachary John Estrada, Fei Deng, Zachary Stephens, Cuong Pham, Zbigniew Kalbarczyk, Ravishankar Iyer
2015 Scalable Computing : Practice and Experience  
We compare the runtime in each environment against the runtime of the same system without virtualisation and measure the relative performance of each hypervisor.  ...  We executed those applications in three separate open-source system virtualisation solutions: the KVM hypervisor, the Xen para-virtualised hypervisor, and Linux Containers.  ...  Research Laboratory and the Air Force Office of Scientific Research, under agreement number FA8750-11-2-0084, in part a grant from Infosys technologies, and in part by a Faculty Award from the IBM Corporation  ... 
doi:10.12694/scpe.v16i1.1061 fatcat:p6d53hny65bdvnoix2utlx7wfi

Look Mum, no VM Exits! (Almost) [article]

Ralf Ramsauer, Jan Kiszka, Daniel Lohmann, Wolfgang Mauerer
2017 arXiv   pre-print
Multi-core CPUs are a standard component in many modern embedded systems.  ...  Their virtualisation extensions enable the isolation of services, and gain popularity to implement mixed-criticality or otherwise split systems.  ...  the system usable in realistic environments.  ... 
arXiv:1705.06932v1 fatcat:7lrwdhqdbrfcbgf72fdxkdvkyq

Management of ICT Implementations in Enterprises in Poland

Bogusława Ziółkowska
2019 Journal of WEI Business and Economics  
in a way that will allow them, as they achieve further levels of virtualisation, to maintain, and even enhance, their ability to create value added.  ...  a broad sense.  ...  Summary Enterprises that engage in cooperation in a networked environment see it as a possibility of creating a greater business potential and generating a greater value as part as cooperation systems.  ... 
doi:10.36739/jweibe.2019.v8.i1.4 fatcat:m7etivtq2bghzmwgorvu4a7dcy

Critical analysis of layer 2 network security in virtualised environments

Ronny L. Bull, Jeanna N. Matthews
2016 International Journal of Communication Networks and Distributed Systems  
In this article, we explore whether layer 2 network attacks that work on physical switches apply to their virtualised counterparts by performing a systematic study across four major hypervisor environments  ...  -Open vSwitch, Citrix XenServer, Microsoft Hyper-V Server and VMware vSphere -in seven different virtual networking configurations.  ...  root privileges on the target machine and place text into a file in /tmp.  ... 
doi:10.1504/ijcnds.2016.10000954 fatcat:mj53ub575nfrtft3vfe22apcca

From multilevel security to multiple independent levels of security/safety: the evolution illustrated through a novel cross-domain architecture

Angelo Liguori
2017 International Journal of Mobile Network Design and Innovation  
A novel cross-domain solution is presented as the thread in-between the two approaches.  ...  The problem becomes even more critical when users with various clearances, privileges, and roles need to operate simultaneously on these security-motley data.  ...  Virtualisation allows different operating systems and standard applications from multiple security domains to run on a single machine.  ... 
doi:10.1504/ijmndi.2017.082802 fatcat:jihunjqyr5fotmvsymol4j5u3e

Automating System Tests Using Declarative Virtual Machines

Sander van der Burg, Eelco Dolstra
2010 2010 IEEE 21st International Symposium on Software Reliability Engineering  
The inclusion of a test case in an automated test suite requires that the system's build process can automatically realise all the environmental dependencies of the test.  ...  As a result, complex system tests become as easy to specify and execute as unit tests.  ...  We wish to thank the contributors to Nixpkgs and NixOS, in particular Nicolas Pierron, who implemented NixOS's module system. We thank Armijn Hemel for his input on the Transmission example.  ... 
doi:10.1109/issre.2010.34 dblp:conf/issre/BurgD10 fatcat:fjhgmoiep5f5xlwcnejzivyevu

Infrastructure as a service: Exploring network access control challenges

Shadha Mohamed Al Amri, Lin Guan
2016 2016 SAI Computing Conference (SAI)  
A. Security Group A firewall system is a critical network access control enforcement mechanism in most computing environments.  ...  Vaquero studied several virtualised (multitenant) datacentres and concluded that most reported systems employed access control techniques to secure their environment [19] .  ... 
doi:10.1109/sai.2016.7556042 fatcat:a4vwlb4fdjdo7jyxlefym3qz74

Intelligent Orchestration of End-to-End Network Slices for the Allocation of Mission Critical Services over NFV Architectures [chapter]

Bego Blanco, Rubén Solozabal, Aitor Sanchoyerto, Javier López-Cuadrado, Elisa Jimeno, Miguel Catalan-Cid
2020 IFIP Advances in Information and Communication Technology  
This paper describes the design and deployment of an intelligent orchestration cycle to manage end-to-end slices on a NFV architecture.  ...  The challenge of deploying mission critical services upon virtualised shared network models is the allocation of both radio and cloud resources to the critical actors who require prioritized and high-quality  ...  The slice concept introduced in 5G, along with the highly virtualised and software-based deployments, enables the automatic on-the-fly adjustment of the resource assignment to the changeable environment  ... 
doi:10.1007/978-3-030-49190-1_7 fatcat:ut6zyfhkcvgs3ba6fs4ueldvoi

Serverless Computing: A Security Perspective [article]

Eduard Marin, Diego Perino, Roberto Di Pietro
2022 arXiv   pre-print
However, in this quest for efficiency, security is not ranked among the top priorities, also because of the (misleading) belief that current solutions developed for virtualised environments could be applied  ...  Serverless Computing is a virtualisation-related paradigm that promises to simplify application management and to solve the last challenges in the field: scale down and easy to use.  ...  . g-Visor-used in Google's production environment since 2018-implements a substantial portion of the Linux system call interface, allowing g-Visor to intercept and respond to container-invoked system calls  ... 
arXiv:2107.03832v2 fatcat:kbidlkkpk5cclbxciy2mrgpepq
« Previous Showing results 1 — 15 out of 530 results