Next generation of Non-volatile Memory(NVM) technologies will change the design of major operating system components and how applications will be written. NVM with its persistent, energy-saving and high performance characteristic supports the need of large-scaled distributed system. With all of its pros aside, researchers concern more about security with NVM. The operating system and programming language should be able to take advantage of NVM and secure sensitive information with proper security mechanism in place. The objective of this project is to implement a prototype of Secure Object Store(SOS)- a proposed software which provides access control inside regions of NVM by taking the concept of capability-based security. The main idea is ...
A Virtual Machine (VM) based secure Portable Execution Environment (PEE) provides a safe and secure ...
Software-Defined Networking (SDN), controlling underlying network devices (i.e., data plane) in a lo...
As virtualization enhances the use of computing and scalability of computing resources it's importan...
Next generation of Non-volatile Memory(NVM) technologies will change the design of major operating s...
Abstract A single address space operating system is an excellent environment for the im-plementation...
As the computer and network evolved and linked with each other, so as the threats of security risks ...
In response to the continuous demand for the ability to process ever larger datasets, as well as dis...
[[abstract]]Object-based storage offloads some works of file systems to storage devices to improve s...
Conventional computer architectures provide little or no hardware support for enforcing data securit...
Nowadays we have very large distributed, partially untrusted systems distributed on the internet. As...
Middleware is referred to as computer software that can connect various software components or appli...
While the non-volatile memory (NVM) has often been discussed in the context of alternatives to SRAM ...
Emerging non-volatile memories (NVMs) have the potential to change the memory-storage hierarchy in c...
Several promising non-volatile memories (NVMs) such as magnetic RAM (MRAM), spin-transfer torque RAM...
As computers become pervasive in environments that include the home and community, new applications ...
A Virtual Machine (VM) based secure Portable Execution Environment (PEE) provides a safe and secure ...
Software-Defined Networking (SDN), controlling underlying network devices (i.e., data plane) in a lo...
As virtualization enhances the use of computing and scalability of computing resources it's importan...
Next generation of Non-volatile Memory(NVM) technologies will change the design of major operating s...
Abstract A single address space operating system is an excellent environment for the im-plementation...
As the computer and network evolved and linked with each other, so as the threats of security risks ...
In response to the continuous demand for the ability to process ever larger datasets, as well as dis...
[[abstract]]Object-based storage offloads some works of file systems to storage devices to improve s...
Conventional computer architectures provide little or no hardware support for enforcing data securit...
Nowadays we have very large distributed, partially untrusted systems distributed on the internet. As...
Middleware is referred to as computer software that can connect various software components or appli...
While the non-volatile memory (NVM) has often been discussed in the context of alternatives to SRAM ...
Emerging non-volatile memories (NVMs) have the potential to change the memory-storage hierarchy in c...
Several promising non-volatile memories (NVMs) such as magnetic RAM (MRAM), spin-transfer torque RAM...
As computers become pervasive in environments that include the home and community, new applications ...
A Virtual Machine (VM) based secure Portable Execution Environment (PEE) provides a safe and secure ...
Software-Defined Networking (SDN), controlling underlying network devices (i.e., data plane) in a lo...
As virtualization enhances the use of computing and scalability of computing resources it's importan...