Sciweavers

64 search results - page 1 / 13
» Using a virtual machine to protect sensitive Grid resources
Sort
View
CONCURRENCY
2007
61views more  CONCURRENCY 2007»
13 years 4 months ago
Using a virtual machine to protect sensitive Grid resources
Xin Zhao, Kevin Borders, Atul Prakash
EUROSYS
2008
ACM
14 years 1 months ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
SISW
2005
IEEE
13 years 10 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
GRID
2008
Springer
13 years 5 months ago
Grid service hosting on virtual clusters
This paper presents an architecture for service hosting on virtual clusters spanning multiple administrative domains that balances the requirements of application developers and r...
Bobby House, Paul Marshall, Michael Oberg, Henry M...
ATC
2007
Springer
13 years 10 months ago
Enhancing Grid Security Using Trusted Virtualization
Abstract. Grid applications have increasingly sophisticated functional and security requirements. However, current techniques mostly protect only the resource provider from attacks...
Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza...