0000000000428719

AUTHOR

Jorge Bernal Bernabe

showing 2 related works from this author

Scalable Virtual Network Video-Optimizer for Adaptive Real-Time Video Transmission in 5G Networks

2020

The increasing popularity of video applications and ever-growing high-quality video transmissions (e.g., 4K resolutions), has encouraged other sectors to explore the growth of opportunities. In the case of health sector, mobile Health services are becoming increasingly relevant in real-time emergency video communication scenarios where a remote medical experts’ support is paramount to a successful and early disease diagnosis. To minimize the negative effects that could affect critical services in a heavily loaded network, it is essential for 5G video providers to deploy highly scalable and priorizable in-network video optimization schemes to meet the expectations of a large quantity of vide…

MultitenancyComputer Networks and CommunicationsComputer sciencebusiness.industryQuality of serviceTestbed020206 networking & telecommunications02 engineering and technologyVideo processingVideo optimizationScalability0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringbusinessVirtual network5GComputer networkIEEE Transactions on Network and Service Management
researchProduct

Analyzing the security of Windows 7 and Linux for cloud computing

2013

We review and analyze the major security features and concerns in deploying modern commodity operating systems such as Windows 7 and Linux 2.6.38 in a cloud computing environment. We identify the security weaknesses and open challenges of these two operating systems when deployed in the cloud environment. In particular, we examine and compare various operating system security features which are critical in providing a secure cloud. These security features include authentication, authorization and access control, physical memory protection, privacy and encryption of stored data, network access and firewalling capabilities, and virtual memory.

AuthenticationCloud computing securityGeneral Computer ScienceComputer sciencebusiness.industryAuthorizationData securityAccess controlCloud computingInformation securityComputer security modelAsset (computer security)EncryptionInternet securityComputer securitycomputer.software_genreSecurity and safety features new to Windows VistaSecurity information and event managementSecurity serviceNetwork Access ControlSecurity through obscuritybusinessLawcomputerComputers & Security
researchProduct