Search results for "Virtual machine"

showing 3 items of 83 documents

Hypervisor-Based White Listing of Executables

2019

We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. peerReviewed

operating systemsmicroprogrammingdatabasesvirtualisointiComputer Networks and CommunicationsComputer science0211 other engineering and technologiesListing (computer)02 engineering and technologycomputer.software_genre020204 information systemsMicrocode0202 electrical engineering electronic engineering information engineeringCode (cryptography)Overhead (computing)virtual machine monitorstietoturvaElectrical and Electronic Engineeringimage segmentation021110 strategic defence & security studieskäyttöjärjestelmätLinuxHypervisorcomputer.file_formatmonitoringOperating systemohjelmointiExecutableLawcomputerIEEE Security & Privacy
researchProduct

STATBOX Concept for Simulation of Urban Phenomena

2013

Abstract An urban environment is a dynamic system which is constantly changing in terms of space and time. There are two dimensions in any urban environment – the physical dimension and the functional dimension. All of the structures of an urban environment interact and people are the intermediaries in this process. The spatial structure of cities has been studied from various perspectives by architects, urban planners, environmental scientists, economists, geographers etc. Constant monitoring that is based on remote sensing, spatial statistics, simulation etc., is needed to make on going note of transformation in the various types of land use that exist, movement of people and business env…

pedestrian movementsLand useComputer scienceProcess (engineering)spatial analyzecomputer.software_genreGISData scienceVisualizationVirtual machineGeneral Earth and Planetary SciencesgeosimulationData miningRoad mapEnterprise GISDimension (data warehouse)computerSpatial analysisGeneral Environmental ScienceProcedia Computer Science
researchProduct

Efficient remote authentication

2013

In 2003, Kennel and Jamieson described a method of remote machine authentication. By authentication, the authors meant that the remote machine is non-virtual, and the operating system on the remote machine is not malicious. The described method does not consider the variety of versions of each operating system. The description completely ignores the existence of modules that can be plugged into the operating system. The authors of this paper adapt the method described by Kennel and Jamieson to the real world so that itcan be applied without prior knowledge of theoperating system or the modules on the remote machine. peerReviewed

todentaminentietokoneetetäkäyttöremote authenticationtietoturvavirtuaaliympäristöVirtual machinedatabasedigital rights management
researchProduct