In the last years, it has emerged a market of virtual ap-pliances, i.e., virtual machine images specifically con-figured to provide a given service (e.g., web hosting). The virtual appliance model greatly reduces the burden of configuring virtual machines from scratch. However, the current model involves risks: security threats, mis-configurations, privacy loss, etc. In this paper, we pro-pose an approach to build dependable virtual machines. It is based on trusted computing and model checking: trusted computing allows for low-level attestation of the software of a virtual appliance, and model checking pro-vides for the automatic verification of the software’s high-level configuration properties. We present our ap-proach, and discuss open r...
Cloud computing has become more and more popular and the technology of rapid virtual machine (VM) cl...
Abstract—Emerging distributed computing architectures, such as grid and cloud computing, depend on t...
We propose a framework for the attestation of the integrity of a remote system that considers not on...
Often in collaborative research environments that are facilitated through virtual infrastructures, t...
Abstract. The concept of Trusted Computing (TC) promises a new approach to improve the security of c...
Virtualization software is increasingly a part of the infrastructure behind our online activities. C...
As the complexity of current software systems increases, we see a correlative increase in the number...
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, howe...
In this paper, we propose an automatic verification technology of software patches for user virtual ...
In today’s computing environment, data is moving to central locations and most computers are merely ...
In this paper we consider the Infrastructure-as-a-Service (IaaS) cloud model which allows cloud user...
Out of the newly emerging and promising technologies is Cloud computing and Infrastructure-as-a-Serv...
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, howe...
In recent years, the rapid development of virtualization and container technology brings unprecedent...
Large-scale deployment and use of cloud computing in industry is accompanied and in the same time ha...
Cloud computing has become more and more popular and the technology of rapid virtual machine (VM) cl...
Abstract—Emerging distributed computing architectures, such as grid and cloud computing, depend on t...
We propose a framework for the attestation of the integrity of a remote system that considers not on...
Often in collaborative research environments that are facilitated through virtual infrastructures, t...
Abstract. The concept of Trusted Computing (TC) promises a new approach to improve the security of c...
Virtualization software is increasingly a part of the infrastructure behind our online activities. C...
As the complexity of current software systems increases, we see a correlative increase in the number...
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, howe...
In this paper, we propose an automatic verification technology of software patches for user virtual ...
In today’s computing environment, data is moving to central locations and most computers are merely ...
In this paper we consider the Infrastructure-as-a-Service (IaaS) cloud model which allows cloud user...
Out of the newly emerging and promising technologies is Cloud computing and Infrastructure-as-a-Serv...
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, howe...
In recent years, the rapid development of virtualization and container technology brings unprecedent...
Large-scale deployment and use of cloud computing in industry is accompanied and in the same time ha...
Cloud computing has become more and more popular and the technology of rapid virtual machine (VM) cl...
Abstract—Emerging distributed computing architectures, such as grid and cloud computing, depend on t...
We propose a framework for the attestation of the integrity of a remote system that considers not on...