大数据安全保障关键技术分析综述

王丹, 赵文兵, 丁治明 - 北京工业大学学报, 2017 - journal.bjut.edu.cn
针对作为各个行业信息化建设重要基础支撑的大数据在收集, 存储, 传输和使用过程中面临的
诸多安全风险, 分析了大数据在这些过程中面临的安全威胁. 综述了大数据相关系统平台和大 …

CloudVMI: A cloud-oriented writable virtual machine introspection

W Qiang, G Xu, W Dai, D Zou, H Jin - IEEE Access, 2017 - ieeexplore.ieee.org
IoT generates considerable amounts of data, which often requires leveraging cloud
computing to effectively scale the costs of transferring and computing these data. The …

Virtual machine introspection based spurious process detection in virtualized cloud computing environment

MAA Kumara, CD Jaidhar - 2015 international conference on …, 2015 - ieeexplore.ieee.org
Virtual Machines are prime target for adversary to take control by exploiting the identified
vulnerability present in it. Due to increasing number of Advanced Persistent Attacks such as …

Towards a Resilient Server with an external VMI in the Virtualization Environment

AP Utomo, I Winarno, I Syarif - EMITTER International Journal of …, 2020 - emitter.pens.ac.id
Currently, cloud computing technology is implemented by many industries in the world. This
technology is very promising due to many companies only need to provide relatively smaller …

HyBIS: Advanced introspection for effective Windows guest protection

R Di Pietro, F Franzoni, F Lombardi - … on ICT Systems Security and Privacy …, 2017 - Springer
Effectively protecting the Windows TM OS is a challenging task, since most implementation
details are not publicly known. Windows OS has always been the main target of malware …

CloudController: a writable and heterogeneous-adaptive virtual machine introspection for cloud management

W Qiang, G Xu, G Sun, T Zhu… - 2017 IEEE Trustcom …, 2017 - ieeexplore.ieee.org
Virtual machine introspection (VMI) is a critical functionality for cloud management because
of the capability of security monitoring. Recently, a concept of writable VMI was proposed to …

An efficient approach for mitigating covert storage channel attacks in virtual machines by the anti-detection criterion

C Wang, N Min-Allah, B Guan, YQ Lin, JZ Wu… - Journal of Computer …, 2019 - Springer
Covert channels have been an effective means for leaking confidential information across
security domains and numerous studies are available on typical covert channels attacks and …

Hybis: Windows guest protection through advanced memory introspection

R Di Pietro, F Franzoni, F Lombardi - arXiv preprint arXiv:1601.05851, 2016 - arxiv.org
Effectively protecting the Windows OS is a challenging task, since most implementation
details are not publicly known. Windows has always been the main target of malwares that …

Full-stack confidentiality cost modeling for cloud computing

MS Storch - 2017 - tede2.pucrs.br
A adoção de princípios de segurança em sistemas computacionais de nuvem é uma
demanda crescente para diversas instituições, incluindo empresas e mesmo agências …

Analyses et préconisations pour les centres de données virtualisés

F Dumont - 2016 - theses.hal.science
Cette thèse présente deux contributions. La première contribution consiste en l'étude des
métriques de performance permettant de superviser l'activité des serveurs physiques et des …