Executing secured virtual machines within a manycore architecture

C Dévigne, JB Bréjon, QL Meunier… - Microprocessors and …, 2017 - Elsevier
… We provide the design of a secure manycore architecture allowing the execution of
physically isolated virtual machines of variable size, and supporting cache coherency. …

A new secure network architecture to increase security among virtual machines in cloud computing

Z Elmrabet, H Elghazi, T Sadiki, H Elghazi - … : Proceedings of the UNet'15 1, 2016 - Springer
secure architecture of Virtual Network machines in order to increase security among virtual
ma… Finally, we present in details new secure architecture and demonstrate how it can face the …

A secure architecture for inter-cloud virtual machine migration

T Zeb, A Ghafoor, A Shibli, M Yousaf - … , Revised Selected Papers, Part I 10, 2015 - Springer
… In this regard, we propose a protocol for secure virtual machine migration among clouds
that preserves confidentiality, authenticity and integrity of virtual machine before, during and …

SA2-MCD: Secured architecture for allocation of virtual machine in multitenant cloud databases

AK Yadav, RK Bharti, RS Raw - Big Data Research, 2021 - Elsevier
… presented the method for secure allocation of virtual machines to slave ESX s servers through
master ESX m servers available at front-end in SA 2 - MCD proposed architecture. In the …

Secure virtual architecture: A safe execution environment for commodity operating systems

J Criswell, A Lenharth, D Dhurjati, V Adve - Proceedings of twenty-first …, 2007 - dl.acm.org
… We refer to this system as a Secure Virtual Machine (SVM) and the virtual object code
that it executes as “bytecode.” The SVA design builds on two key technologies from our …

Secure and flexible monitoring of virtual machines

BD Payne, DPA Martim, W Lee - Twenty-Third Annual …, 2007 - ieeexplore.ieee.org
… XenAccess provides virtual memory introspection and virtual disk monitoring capabilities. …
in a secure and efficient manner is non-trivial. However, our architecture demonstrates how …

[PDF][PDF] Building a general-purpose secure virtual machine monitor

R Sailer, T Jaeger, JL Griffin… - RC23537 …, 2005 - dominoweb.draco.res.ibm.com
… we have developed a generic security architecture. Mutually suspicious applications and
run… security architecture. We introduce the design of the sHype hypervisor security architecture

NOVA: A microhypervisor-based secure virtualization architecture

U Steinberg, B Kauer - Proceedings of the 5th European conference on …, 2010 - dl.acm.org
virtualization security with an architecture that minimizes the trusted computing base of virtual
machines… implementation of NOVA — a secure virtualization architecture, which is based …

Secured architecture for inter-VM traffic in a Cloud environment

K Benzidane, S Khoudali… - 2nd IEEE Latin American …, 2013 - ieeexplore.ieee.org
… Since virtualization is the fundamental of the CC, offering higher machine efficiency due to
increased utilization, energy savings, and the flexibility to build or destroy virtual machines (…

CloudMonatt: An architecture for security health monitoring and attestation of virtual machines in cloud computing

T Zhang, RB Lee - … International Symposium on Computer Architecture, 2015 - dl.acm.org
… This also enables cloud providers to deploy new secure servers, which may have different
… unsecured virtual machines on their existing machines. The availability of secure computing …