Search results for "virtualization"

showing 10 items of 54 documents

Virtualization of Remote Devices and Services in Residential Networks

2009

Lately solutions for remote access for residential services have been proposed. However, these solutions require modifications to the service controllers. In addition, remote access adds complexity to the client application. We propose here a solution for decoupling remote access from the client itself with an entity that creates virtual instances of remote services in a local network. Thereby, clients will be able to discover the virtual instance and use it. Moreover, client applications do not need to distinguish between local and remote services hence reducing complexity.

business.industryComputer scienceMobile computingLocal area networkVirtual realityVirtualizationcomputer.software_genreComputer securityServerUniversal Plug and PlayHome computingbusinesscomputerComputer network2009 Third International Conference on Next Generation Mobile Applications, Services and Technologies
researchProduct

Hypervisor-assisted Atomic Memory Acquisition in Modern Systems

2019

Reliable memory acquisition is essential to forensic analysis of a cyber-crime. Various methods of memory acquisition have been proposed, ranging from tools based on a dedicated hardware to software only solutions. Recently, a hypervisor-based method for memory acquisition was proposed (Qi et al., 2017; Martignoni et al., 2010). This method obtains a reliable (atomic) memory image of a running system. The method achieves this by making all memory pages non-writable until they are copied to the memory image, thus preventing uncontrolled modification of these pages. Unfortunately, the proposed method has two deficiencies: (1) the method does not support multiprocessing and (2) the method does…

integrity of a memory snapshotreliabilityvirtualisointiComputer scienceforensic soundnessHypervisormuistit (tietotekniikka)computer.software_genrevirtualizationatomicitymemory forensicsmemory acquisitionOperating systemMemory acquisitionlive forensicstietoturvacomputerProceedings of the 5th International Conference on Information Systems Security and Privacy
researchProduct

Applications of Virtualization in Systems Design

2012

internet streamingQEMUasynchronous mirroringvirtualisointiLLVMcloud computingtrusted computingsysteemityötietotekniikkavirtualizationKVMstorage virtualization
researchProduct

Development of Network Security Education

2021

Distance education has grown tremendously over the last decade. Internet technologies have enabled a large-scale dispensation of lectures, exercises, and training. Virtual Learning Management Systems (LMSs) offer a number of tools to realize distance education and distance learning. In this work, we present a virtual system architecture for training cyber security professionals with hands-on skills. The architecture is based on a VirtualBox virtualization environment. Guest machines are installed on an instance of VirtualBox. The installed environment offers a safe and isolated workbench for experiments. After installation and configuration of the environment, students perform a number of i…

järjestelmäarkkitehtuurioppimisympäristöComputer scienceNetwork securityDistance educationtietotekniikkacomputer.software_genreetäopetusComputingMilieux_COMPUTERSANDEDUCATIONnetwork securityverkko-opetusArchitecturetietoturvakyberturvallisuusMultimediabusiness.industryhallintajärjestelmätVirtualizationverkko-oppiminendistance educationManagement systemSystems architectureVirtual learning environmentThe Internetbusinesscomputerverkkohyökkäykset
researchProduct

THE VIRTUALIZATION OF CH FOR HISTORICAL RECONSTRUCTION: THE AR FRUITION OF THE FOUNTAIN OF ST. GEORGE SQUARE IN VALLETTA (MALTA)

2020

Abstract. Improving accessibility to Cultural Heritage (CH) is an increasingly urgent challenge today. It is not only a matter of physical inaccessibility but also temporal, considering that part of CH now lost. Fortunately, the most modern technological tools are helping to break down both space and time barriers. In facts, recent advances in representation, 3D modelling and survey methodologies opened new scenarios for valorization and conservation of CH. In particular, the improvement of quality in resolution and sensor sensitivity of cameras allowed to achieve the right level of 3D reconstruction through digital photogrammetry procedures. In the same field, terrestrial laser scanners (T…

lcsh:Applied optics. PhotonicsArchitectural engineeringComputer scienceBig dataGeomaticsAR VR TLS UAV Photogrammetry 3D modellingVirtual realitycomputer.software_genrelcsh:Technology01 natural sciences0502 economics and businesslcsh:Tbusiness.industry010401 analytical chemistry05 social scienceslcsh:TA1501-1820Virtualization0104 chemical sciencesCultural heritagelcsh:TA1-2040Augmented realitylcsh:Engineering (General). Civil engineering (General)FountainbusinessMobile devicecomputerSettore ICAR/06 - Topografia E Cartografia050212 sport leisure & tourismThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences
researchProduct

Zjawisko wirtualizacji pieniądza w warunkach polskich

2017

Pieniądz jest elementem gospodarki od wieków. Przez ten czas jego forma ewoluowała od prymitywnych produktów do banknotów i monet. Współcześnie coraz powszechniejsze staje się korzystanie z pieniądza elektronicznego, a nawet pieniądza wirtualnego. Pojawiają się zatem pytania, jak ten pieniądz działa, czy pełni takie same funkcje jak tradycyjny pieniądz i czy na pewno jest istotną alternatywą dla obecnie funkcjonującego pieniądza fiducjarnego. W tym kontekście rodzi się pytanie, czy system finansowy w obecnym kształcie może nadal funkcjonować, czy też będzie raczej ewoluować w kierunku systemu opartego na walucie wirtualnej. Celem opracowania jest próba przedstawienia pieniądza wirtualnego j…

money virtualizationwirtualizacja pieniądzapieniądz wirtualnyvirtual moneypieniądz elektronicznyelectronic moneyBezpieczny Bank
researchProduct

Wireless card virtualization: from virtual NICs to virtual MAC machines

2012

Virtualization has been a hot topic in computer science this last 10 years, and a key enabler to the recent advances. By technically enabling the Cloud paradigm, virtualization is becoming an inspiring source for the whole IT industry. At the same moment the virtualization of commodity PC was envisioned, Software Defined Radio started as a huge promise of efficient wireless transmission hardware. Unfortunately, the pace of innovation has still to reach the one of the PC virtualization. Yet, there is a another option. The current state of the art of hardware and software of wireless adapter in standard PC reveals interesting capabilities in terms of unused wireless capacity, processing power…

programmable MACSettore ING-INF/03 - Telecomunicazionicognitive radiovirtualizationreconfigurability
researchProduct

Enforcing trust for execution-protection in modern environments

2016

The business world is exhibiting a growing dependency on computer systems, their operations and the databases they contain. Unfortunately, it also suffers from an ever growing recurrence of malicious software attacks. Malicious attack vectors are diverse and the computer-security industry is producing an abundance of behavioral-pattern detections to combat the phenomenon. Modern processors contain hardware virtualization capabilities that support implementation of hypervisors for the purpose of managing multiple Virtual-Machines (VMs) on a single computer platform. The facilities provided by hardware virtualization grant the hypervisor control of the hardware platform at an effective privil…

pääsynvalvontavirtuaalikoneetvirtualisointiwhitelistingAPT preventiontrusted computinghypervisoritcyber protectionhypervisortietoturvavirtualizationattestationthin-hypervisor
researchProduct

System for Executing Encrypted Java Programs

2017

pääsynvalvontavirtualisointiJavaComputer sciencetrusted computing02 engineering and technologycomputer.software_genreEncryptionReal time Java020204 information systems0202 electrical engineering electronic engineering information engineeringtietoturvahypervisorJava appletcomputer.programming_languageta113Programming languagebusiness.industrystrictfp020207 software engineeringvirtualizationJava concurrencyremote attestationbusinesscomputerJava annotationJavaProceedings of the 3rd International Conference on Information Systems Security and Privacy
researchProduct

Selaimen sormenjälkitunnistamisen torjunta käyttöjärjestelmäavusteisella virtualisoinnilla

2017

Selaimen sormenjälkitunnistaminen mahdollistaa käyttäjien seurannan käyttäjien yksityisyyttä luokkaavasti. Tutkielmassa selvitetään voidaanko käyttöjärjestelmäavusteisilla virtualisointiteknologioilla vastata selaimen sormenjälkitunnistamisen torjunnan asettamiin haasteisiin. Tutkielmassa havaittiin neljä eri haastetta selaimen sormenjälkitunnistamisen torjunnalle. Tutkielma keskittyy Linux-kernelin tukemiin käyttöjärjestelmäavusteisiin virtualisointiteknologiohin, jotka mahdollistavat ohjelmistokonttien toteuttamisen. Preventing browser fingerprinting using operating system level virtualization. Browser fingerprinting enables tracking of users in a way that violates users' privacy. In this…

selaimetvirtualisointisovelluksetsormenjälkitunnistaminenohjelmistokontitbrowser fingerprintingtietoturvacontainerprivacyohjelmistokehityssovellukset (tietotekniikka)virtualizationyksilönsuoja
researchProduct