Filters








22 Hits in 6.6 sec

Secure Computation Infrastructure And Self-Management Of Vm Security

Markus Miettinen
2016 Zenodo  
Solutions related to the self-management of security settings are demonstrated through prototypes related to security policy modelling and enforcement.  ...  the service providers with the help of hardware security features.  ...  According to [75] measurement "is the process of computing a state indicator of hardware and/or software".  ... 
doi:10.5281/zenodo.263800 fatcat:ajuzporlvze4vhhuqlkuja46jy

D1.1 - State of the Art Analysis

Danilo Ardagna
2021 Zenodo  
) introducing the software development frameworks and hardware solutions which allow to run such applications in a computing continuum.  ...  The aim of the AI-SPRINT "Artificial intelligence in Secure PRIvacy-preserving computing coNTinuum" project is to develop a platform composed of design and runtime management tools to seamlessly design  ...  An example for hardware root-of-trust is the Trusted Platform Module (TPM).  ... 
doi:10.5281/zenodo.6372377 fatcat:f6ldfuwivbcltew4smiiwphfty

Edge computing for 5G networks - white paper

David Artuñedo Guillen, Bessem Sayadi, Pascal Bisson, Jean Phillippe Wary, Håkon Lonsethagen, Carles Antón, Antonio de la Oliva, Alexandros Kaloxylos, Valerio Frascolla
2020 Zenodo  
, c) a discussion about the role of security, and d) an analysis of several business aspects around the Edge ecosystem.  ...  The 5G PPP Initiative and the 5GIA are happy to present a new white paper entitled "Edge Computing for 5G Networks".  ...  FPGA as a Platform to Accelerate Edge Computing FPGAs are programmable hardware, which offer the performance of an ASIC with the flexibility of software.  ... 
doi:10.5281/zenodo.4555780 fatcat:sg62p5agq5c75hsbr2hyb4vkqe

Edge computing for 5G networks - white paper

David Artuñedo Guillen, Bessem Sayadi, Pascal Bisson, Jean Phillippe Wary, Håkon Lonsethagen, Carles Antón, Antonio de la Oliva, Alexandros Kaloxylos, Valerio Frascolla
2020 Zenodo  
, c) a discussion about the role of security, and d) an analysis of several business aspects around the Edge ecosystem.  ...  The 5G PPP Initiative and the 5GIA are happy to present a new white paper entitled "Edge Computing for 5G Networks".  ...  FPGA as a Platform to Accelerate Edge Computing FPGAs are programmable hardware, which offer the performance of an ASIC with the flexibility of software.  ... 
doi:10.5281/zenodo.3698117 fatcat:zjbuceqquzfchcylpgacwgxjpa

Secure System Virtualization: End-to-End Verification of Memory Isolation [article]

Hamed Nemati
2020 arXiv   pre-print
They reduce the software portion of the system's trusted computing base to a thin layer, which enforces isolation between low- and high-criticality components.  ...  Over the last years, security kernels have played a promising role in reshaping the landscape of platform security on today's ubiquitous embedded devices.  ...  A similar approach is used in [43] to invalidate security guarantees, attestation of a platform's software, provided by a Trusted Platform Module (TPM).  ... 
arXiv:2005.02605v1 fatcat:h7sdyjoxyrexhaswjns5mcfdey

Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues

Pardeep Kumar, Yun Lin, Guangdong Bai, Andrew Paverd, Jin Song Dong, Andrew Martin
2019 IEEE Communications Surveys and Tutorials  
Based on the presented threats, we derive a set of security and privacy requirements for SG metering networks.  ...  Specifically, we present a threat taxonomy considering: (i) threats in system-level security, (ii) threats and/or theft of services, and (iii) threats to privacy.  ...  In addition, utilizing the TPM and embed Transport Layer Security (TLS) cryptography library, performance evaluations have been demonstrated on different platforms, e.g., Intel TPM, Linux-TPM, VM-vTPM,  ... 
doi:10.1109/comst.2019.2899354 fatcat:67bz5glcfbbldpqagxmhvy2ssm

EMBnet.journal 19 Suppl. A

EMBnet Journal
2013 EMBnet journal  
Supergenome. of viromes in veterinary and public health settings. * Ignacio Blanquer Blanquer: Supporting NGS pilelines in the cluod. * Luca Pireddu: Automated and traceable processing for large-scale  ...  Leif Andersson: How domestic animal genomics can teach human medicine and medicine and evolutionary biology "down stream " bioinformatics analysis in order to meet the demands of the scientific community  ...  The Bo Segerman Group, SVA is thanked for sharing bioinformatics software and hardware. The authors also thank the staff at the SVA and SMI EHEC laboratories for excellent technical asssistance.  ... 
doi:10.14806/ej.19.a.689 fatcat:2xs4bsifarfipopojjerizk3ce

D02.3 Requirements Definition and Specification Deliverable title Requirements Definition and Specification WP contributing to the deliverable WP02 (contributions from WP02-08) Responsible Organisation ITAS

Dirk Kuhlmann, Arnd Weber, Irina Beliakova, Alexander Boettcher, Hans Brandl, Hubert Braunwart, Anthony Bussani, Görkem Çetin, Chris Dalton, Eckhard Delfs, Kurt Dietrich, Roman Drahtmüller (+29 others)
unpublished
OpenTC sets out to develop trusted and secure computing systems based on Trusted Computing hardware and Open Source Software.  ...  This deliverable provides a high-level specification to guide design and future implementation.  ...  software TPM simulator as a user mode component.  ... 
fatcat:msfiwtadezaapnb7lhuvlkdduu

Transactional Memory, 2nd edition

Tim Harris, James Larus, Ravi Rajwar
2010 Synthesis Lectures on Computer Architecture  
On some hardware platforms, contention on the global clock may be a worry.  ...  This is based on PTLSim, providing a detailed, cycle-accurate full-system simulation of a multi-core system. The simulator models the proposed hardware instructions.  ...  WWT was a DARPA and NSF-funded project investigated new approaches to simulating, building, and programming parallel shared-memory computers.  ... 
doi:10.2200/s00272ed1v01y201006cac011 fatcat:25d3gvp5zrfqlgpzdzknqouofi

Downloadable Full Issue

2020 Hungarian Journal of Industry and Chemistry  
Besides the PMSM, the power electronics and battery are also modeled in an OrCAD PSpice circuit-simulation environment that serves as a model of an electric power conversion system for the simulation and  ...  Using a similar conversion tool, the scenario generation and synthesis of realistic road networks for driving simulator applications can be more convenient and faster.  ...  We would like to thank Zoltán Lukács and Tamás Kristóf to support conducting EIS measurements in the laboratory of Faculty of Physical Chemistry and sharing their knowledge in electrochemical modeling.  ... 
doi:10.33927/931 fatcat:pgjn46w74vb5djx3koev7lnsty

Google Android: A State-of-the-Art Review of Security Mechanisms [article]

A. Shabtai, Y. Elovici Department of Information Systems Engineering Ben-Gurion University Israel, Department of Computer Science Ben-Gurion University Israel, Deutsche Telekom Laboratories at Ben-Gurion University Israel)
2009 arXiv   pre-print
Google's Android is a comprehensive software framework for mobile communication devices (i.e., smartphones, PDAs).  ...  The Android framework includes an operating system, middleware and a set of key applications.  ...  V2: Android is an open-platform that provides API to most of the software and hardware components (SIM card, battery, memory).  ... 
arXiv:0912.5101v1 fatcat:lco6bcdjfffvdjaopqf24jmz2u

Proactive Security Auditing in Clouds [chapter]

Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
2019 Advances in Information Security  
Also, to demonstrate the applicability, scalability and efficiency of our proposed system, we integrate it to OpenStack, a major cloud platform, and evaluate it using both synthetic and real data.  ...  The intercept-and-check approach offers runtime auditing and performs all the auditing steps after the occurrence of a critical event (i.e., which may potentially violate a security property).  ...  a chain of trust from TPM chips embedded inside the cloud hardware, e.g., [10, 64] ).  ... 
doi:10.1007/978-3-030-23128-6_6 fatcat:b6exjivobrfg5pju3d2eqx6jvu

Knowledge Extracted from Copernicus Satellite Data

Dumitru Octavian, Schwarz Gottfried, Eltoft Torbjørn, Kræmer Thomas, Wagner Penelope, Hughes Nick, Arthus David, Fleming Andrew, Koubarakis Manolis, Datcu Mihai
2019 Zenodo  
on ESA's Food Security and Polar Thematic Exploitation Platforms.  ...  In this publication, we focus on the Polar case which requires the selection of validation areas, the generation of a training dataset, the development and testing of deep learning algorithms, and the  ...  Data Curation of this project is a useful exploration of the data management and sharing life cycle. It has achieved the effective management and timely sharing of data.  ... 
doi:10.5281/zenodo.3941573 fatcat:zzifwgljifck5bpjnboetsftfu

Relationship between strategic human resource management and firm performance

Wan‐Jing April Chang, Tung Chun Huang
2005 International journal of manpower  
Acknowledgements We are especially grateful to the staff (manager and midwives) of the three obstetrics ward of Saronno, Gallarate and Busto Arsizio Hospitals, who collaborated and gave us permission to  ...  Annual Review of Cybertherapy and Telemedicine 2017 Acknowledgements This work was supported by the Russian Science Foundation (grant 15-18-00091).  ...  The mobile application prototype was then developed using online software on appypie.com which helps users to develop apps for different mobile platforms.  ... 
doi:10.1108/01437720510615125 fatcat:lnson2dlrndgxg7cgjnavyog4a

Public-Key Infrastructure [chapter]

2013 Wireless Mobile Internet Security  
All submissions underwent a thorough blind review by at least three PC members, resulting in a careful selection and revision of the accepted papers. The authors came from 10 countries  ...  Nevertheless, constructing effective, practical, secure and low cost means for assuring authenticity and validity of public keys used in large-scale networked services remains both a technological and  ...  The BBN RPKI software was written by Charlie Gardiner, Joshua Gruenspecht, Marla Shepard, Peiter "mudge" Zatko, and the authors, under the management of Karen Seo.  ... 
doi:10.1002/9781118512920.ch7 fatcat:hocfzfhi4rbuhmssop2hkwbc64
« Previous Showing results 1 — 15 out of 22 results