Zobrazeno 1 - 10
of 29
pro vyhledávání: '"write protection"'
Autor:
Takahiro Shinagawa, Yosuke Ozawa
Publikováno v:
CLOUD
Virtual machine (VM) live migration is an essential feature for cloud vendors. Since VM live migration involves transferring a large amount of memory between VMs, reducing memory transfer is critical to successful and efficient migration. However, so
Publikováno v:
SAC
Consistent checkpointing is an essential technique for in-memory databases (IMDBs) to achieve some persistence to data. Towards a fast consistent checkpointing with low overhead and low memory footprint, many consistent checkpointing algorithms have
Publikováno v:
SAC
A rootkit is a piece of code that aims to manipulate the computer behaviour without being detected. Rootkits are mainly used to disable kernel self-protection, hide malware presence, provide a covert communication channel between malware and their Co
Publikováno v:
2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA).
Write protection of storage media is essential in cyber forensics which ensures data integrity in storage devices. In order to write protect the storage devices such as Hard Disk Drive (HDD) or Solid State Device (SSD), hardware based solution is sec
Autor:
Mohammad Mannan, Lianying Zhao
Publikováno v:
NDSS
Unauthorized data alteration has been a longstanding threat since the emergence of malware. System and application software can be reinstalled and hardware can be replaced, but user data is priceless in many cases. Especially in recent years, ransomw
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b8c126d744e8746809393a659f368a71
Autor:
Zelalem Birhanu Aweke, Todd Austin
Publikováno v:
DATE
Embedded device security is a particularly difficult challenge, as the quantity of devices makes them attractive targets, while their cost-sensitive design leads to less-than-desirable security implementations. Most current low-end embedded devices d
Autor:
Qing Xian Wang, Xiao Rui Wang
Publikováno v:
Applied Mechanics and Materials. :2305-2308
To deal with the problem of external storages management in multiple virtual machines environment, a system design scheme of external storages management is proposed with the idea of virtual memory management and protocol of object-based Network stor
Publikováno v:
IEEJ Transactions on Electronics, Information and Systems. 132:253-259
While thin-client systems are diffusing as an effective security method in enterprises and organizations, there is a new approach called pseudo thin-client system. In this system, local disks of clients are write-protected and user data is forced to
Publikováno v:
Advanced Materials Research. :1307-1312
The datacenter of one university owns massive E-Learning resources, and how to support safe and efficient access so as to support large-scale concurrent read and write protection has troubled the administrators of the campus datacenter. In this paper
Publikováno v:
TRIOS@SOSP
How to satisfy the on-demand environment while providing highly dependable services with minimum cost is a challenging issue. Improvements in the reusability of virtualization technology have enabled operating system's adaptability, which helps users