NT Ferguson, YA Samsonov, K Kinshumann… - US Patent …, 2017 - Google Patents
Deploying an encrypted entity on a trusted entity is illus trated herein. A method includes, at a trusted entity, wherein the trusted entity is trusted by an authority as a result of providing a …
I Weinstein, N Barak - US Patent 8,954,964, 2015 - Google Patents
BACKGROUND Cloud computing has augmented the requirements and capacity available for businesses, individuals, and other enti ties to implement their computing needs. Cloud …
JN Raghu, M Bandi, A Agarwal - US Patent 9,311,140, 2016 - Google Patents
the present patent application is directed to virtual-machine-based computing and cloud computing and, in particular, to methods and systems for moving virtual machines and virtual …
N Barak, A Jerbi, E Hadar, M Kletskin - US Patent 9,389,898, 2016 - Google Patents
Systems and methods associated with virtual machine Secu rity are described herein. One example method includes instantiating a guest Virtual machine in a virtual computing …
O Khesin - US Patent 9,054,917, 2015 - Google Patents
Technologies are generally described for the secure live migration of virtual machines. The migration may take place in the context of, for example, public clouds. In various …
JN Raghu - US Patent 9,391,801, 2016 - Google Patents
Assistant Examiner—Jacob Dascomb (57) ABSTRACT The current document discloses methods and systems for extending an internal network within a first cloud-computing facility …
K Uehara, N Hattori - US Patent 9,288,155, 2016 - Google Patents
A computer system, comprising: a virtual computer system and a verification system, the virtual computer system including: a deployment request reception part for receiving a …
AJ Doane, AE Schoof, RE Fitzgerald… - US Patent …, 2015 - Google Patents
A vendor of virtual machine images accesses a virtual computer system service to upload a digitally signed virtual machine image to a data store usable by customers of the virtual …
MF Novak, N Ben-Zvi, NT Ferguson - US Patent 9,652,631, 2017 - Google Patents
Managing encrypted datasets is illustrated. A method includes obtaining a first decryption key. The first decryption key is configured to be used to decrypt an encrypted dataset that …