To see the other types of publications on this topic, follow the link: Virtual machines security.

Dissertations / Theses on the topic 'Virtual machines security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 39 dissertations / theses for your research on the topic 'Virtual machines security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Fediushyn, O. I., O. O. Yatsiuk, and H. O. Rusanov. "Virtual environment for training auditors with information security." Thesis, ВА ЗС АР; НТУ "ХПІ"; НАУ, ДП "ПДПРОНДІАВІАПРОМ"; УмЖ, 2021. https://openarchive.nure.ua/handle/document/15754.

Full text
Abstract:
The goal of the study is to create a laboratory infrastructure that allows instructors to quickly create virtualized environments for simulating various cyber threats. The testing environment for this demo consists of Windows 10, Ubuntu 16.4, Kali linux and OSSIM. Completed attacks together with potential moves are gathered and put into various attack tree diagrams for analysis so as to find out the most effective attacks against each host.
APA, Harvard, Vancouver, ISO, and other styles
2

Carbone, Martim. "Semantic view re-creation for the secure monitoring of virtual machines." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44841.

Full text
Abstract:
The insecurity of modern-day software has created the need for security monitoring applications. Two serious deficiencies are commonly found in these applications. First, the absence of isolation from the system being monitored allows malicious software to tamper with them. Second, the lack of secure and reliable monitoring primitives in the operating system makes them easy to be evaded. A technique known as Virtual Machine Introspection attempts to solve these problems by leveraging the isolation and mediation properties of full-system virtualization. A problem known as semantic gap, howeve
APA, Harvard, Vancouver, ISO, and other styles
3

Žirgulis, Mantas. "Virtualios aplinkos saugos sistemos prototipas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2013. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20131105_100757-27871.

Full text
Abstract:
Magistro darbe „virtualios aplinkos saugos sistemos prototipas“ aprašyta ir suprojektuota virtualios aplinkos saugos sistema (toliau VASS), kuri, virtualioms mašinoms esančiom pasyvioje būsenoje, užtikrina pagrindinius informacijos saugumo tikslus – konfidencialumą, vientisumą ir prieinamumą. Virtualią mašiną, esančią pasyvioje būsenoje, pagrindinės operacinės sistemos ar įvairių trečių šalių įrankių pagalba, galima prijungti (angl. mount) kaip atskirą particiją, o jos failų sistemoje naršyti tarsi paprastame kietajame diske. Šis funkcionalumas sukelia galimas saugumo grėsmes duomenų konfidenc
APA, Harvard, Vancouver, ISO, and other styles
4

Shah, Payal Hemchand. "Security in live Virtual Machine migration." Thesis, Wichita State University, 2011. http://hdl.handle.net/10057/5205.

Full text
Abstract:
Virtualization has become an essential technology for organizations. With on-demand services from vendors, a substantial rise in the use of virtualization has been noticed. Today there are various kinds of virtualization techniques offering different advantages. One of the important features of virtualization is live virtual machine (VM) migration. In live VM migration, the controls of a VM are migrated from one physical host to another. Workload balancing, and server maintenance becomes easy by migrating the VM. The ability to reboot or shut down the physical server without affecting running
APA, Harvard, Vancouver, ISO, and other styles
5

Hu, Ji. "A virtual machine architecture for IT-security laboratories." Phd thesis, [S.l.] : [s.n.], 2006. http://deposit.ddb.de/cgi-bin/dokserv?idn=980935652.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Denz, Robert. "Securing Operating Systems Through Utility Virtual Machines." Thesis, Dartmouth College, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10190644.

Full text
Abstract:
<p> The advent of hypervisors revolutionized the computing industry in terms of <i>malware prevention and detection, secure virtual machine managers, </i> and <i>cloud resilience.</i> However, this has resulted in a disjointed response to handling known threats rather than preventing unknown <i>zero-day</i> threats. This thesis introduces a new paradigm to cloud computing &ndash; <i>utility virtual machines</i> &ndash; that directly leverages virtualization hardware for protection and eliminates often accepted roles of the operating system kernel. This represents a break from prevailing practi
APA, Harvard, Vancouver, ISO, and other styles
7

Lin, Sammy. "Towards virtual machine integrity using introspection /." Online version of thesis, 2009. http://hdl.handle.net/1850/10648.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hu, Ji, Dirk Cordel, and Christoph Meinel. "A virtual machine architecture for creating IT-security laboratories." Universität Potsdam, 2006. http://opus.kobv.de/ubp/volltexte/2009/3307/.

Full text
Abstract:
E-learning is a flexible and personalized alternative to traditional education. Nonetheless, existing e-learning systems for IT security education have difficulties in delivering hands-on experience because of the lack of proximity. Laboratory environments and practical exercises are indispensable instruction tools to IT security education, but security education in con-ventional computer laboratories poses the problem of immobility as well as high creation and maintenance costs. Hence, there is a need to effectively transform security laboratories and practical exercises into e-learning forms
APA, Harvard, Vancouver, ISO, and other styles
9

Maiyama, Kabiru M. "Performance Analysis of Virtualisation in a Cloud Computing Platform. An application driven investigation into modelling and analysis of performance vs security trade-offs for virtualisation in OpenStack infrastructure as a service (IaaS) cloud computing platform architectures." Thesis, University of Bradford, 2019. http://hdl.handle.net/10454/18587.

Full text
Abstract:
Virtualisation is one of the underlying technologies that led to the success of cloud computing platforms (CCPs). The technology, along with other features such as multitenancy allows delivering of computing resources in the form of service through efficient sharing of physical resources. As these resources are provided through virtualisation, a robust agreement is outlined for both the quantity and quality-of-service (QoS) in a service level agreement (SLA) documents. QoS is one of the essential components of SLA, where performance is one of its primary aspects. As the technology is progressi
APA, Harvard, Vancouver, ISO, and other styles
10

Herzog, Almut. "Usable Security Policies for Runtime Environments." Doctoral thesis, Linköpings universitet, IISLAB - Laboratoriet för intelligenta informationssystem, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8809.

Full text
Abstract:
The runtime environments provided by application-level virtual machines such as the Java Virtual Machine or the .NET Common Language Runtime are attractive for Internet application providers because the applications can be deployed on any platform that supports the target virtual machine. With Internet applications, organisations as well as end users face the risk of viruses, trojans, and denial of service attacks. Virtual machine providers are aware of these Internet security risks and provide, for example, runtime monitoring of untrusted code and access control to sensitive resources. Our wo
APA, Harvard, Vancouver, ISO, and other styles
11

Hebbal, Yacine. "Semantic monitoring mechanisms dedicated to security monitoring in IaaS cloud." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2017. http://www.theses.fr/2017IMTA0029/document.

Full text
Abstract:
L’introspection de machine virtuelle (VM) consiste à superviser les états et les activités de celles-ci depuis la couche de virtualisation, tirant ainsi avantage de son emplacement qui offre à la fois une bonne visibilité des états et des activités des VMs ainsi qu’une bonne isolation de ces dernières. Cependant, les états et les activités des VMs à superviser sont vus par la couche de virtualisation comme une suite binaire de bits et d’octets en plus des états des ressources virtuelles. L’écart entre la vue brute disponible à la couche de virtualisation et celle nécessaire pour la supervision
APA, Harvard, Vancouver, ISO, and other styles
12

Aslam, Mudassar. "Bringing Visibility in the Clouds : using Security, Transparency and Assurance Services." Doctoral thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-25376.

Full text
Abstract:
The evolution of cloud computing allows the provisioning of IT resources over the Internet and promises many benefits for both - the service users and providers. Despite various benefits offered by cloud based services, many users hesitate in moving their IT systems to the cloud mainly due to many new security problems introduced by cloud environments. In fact, the characteristics of cloud computing become basis of new problems, for example, support of third party hosting introduces loss of user control on the hardware; similarly, on-demand availability requires reliance on complex and possibl
APA, Harvard, Vancouver, ISO, and other styles
13

Schneider, Christian A. [Verfasser], Claudia [Akademischer Betreuer] Eckert, and Thorsten [Akademischer Betreuer] Holz. "Full Virtual Machine State Reconstruction for Security Applications / Christian A. Schneider. Gutachter: Claudia Eckert ; Thorsten Holz. Betreuer: Claudia Eckert." München : Universitätsbibliothek der TU München, 2013. http://d-nb.info/1044395907/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Pfoh, Jonas [Verfasser], Claudia [Akademischer Betreuer] Eckert, and Uwe [Akademischer Betreuer] Baumgarten. "Leveraging Derivative Virtual Machine Introspection Methods for Security Applications / Jonas Pfoh. Gutachter: Claudia Eckert ; Uwe Baumgarten. Betreuer: Claudia Eckert." München : Universitätsbibliothek der TU München, 2013. http://d-nb.info/1033403024/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Pfoh, Jonas Verfasser], Claudia [Akademischer Betreuer] [Eckert, and Uwe [Akademischer Betreuer] Baumgarten. "Leveraging Derivative Virtual Machine Introspection Methods for Security Applications / Jonas Pfoh. Gutachter: Claudia Eckert ; Uwe Baumgarten. Betreuer: Claudia Eckert." München : Universitätsbibliothek der TU München, 2013. http://nbn-resolving.de/urn:nbn:de:bvb:91-diss-20130318-1115811-0-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Athreya, Manoj B. "Subverting Linux on-the-fly using hardware virtualization technology." Thesis, Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/34844.

Full text
Abstract:
In this thesis, we address the problem faced by modern operating systems due to the exploitation of Hardware-Assisted Full-Virtualization technology by attackers. Virtualization technology has been of growing importance these days. With the help of such a technology, multiple operating systems can be run on a single piece of hardware, with little or no modification to the operating system. Both Intel and AMD have contributed to x86 full-virtualization through their respective instruction set architectures. Hardware virtualization extensions can be found in almost all x86 processors these day
APA, Harvard, Vancouver, ISO, and other styles
17

Sjöstedt, Matildha. "Monitoring of Cyber Security Exercise Environments in Cyber Ranges : with an implementation for CRATE." Thesis, Linköpings universitet, Programvara och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177647.

Full text
Abstract:
In a world where much of society is dependent on digital infrastructure, various cyber threats can pose a great risk to businesses, critical infrastructure and potentially entire nations. For this reason, research and education as well as the preparation of strategies,  training of personnel etc., is imperative. Cyber ranges can provide ''safe environments'' in which for example cyber security exercises and experiments can be conducted. While easier to deploy and configure than ''real'' infrastructures, monitoring of such environments during ongoing exercises/experiments poses a number of chal
APA, Harvard, Vancouver, ISO, and other styles
18

Zahedi, Saed. "Virtualization Security Threat Forensic and Environment Safeguarding." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-32144.

Full text
Abstract:
The advent of virtualization technologies has evolved the IT infrastructure and organizations are migrating to virtual platforms. Virtualization is also the foundation for cloud platform services. Virtualization is known to provide more security into the infrastructure apart from agility and flexibility. However security aspects of virtualization are often overlooked. Various attacks to the virtualization hypervisor and its administration component are desirable for adversaries. The threats to virtualization must be rigorously scrutinized to realize common breaches and knowing what is more att
APA, Harvard, Vancouver, ISO, and other styles
19

Backe, Anton, and Hugo Lindén. "Cloud Computing Security: A Systematic Literature Review." Thesis, Uppsala universitet, Institutionen för informatik och media, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-256426.

Full text
Abstract:
This literature review seeks to identify the major security issues and their solutions in cloud computing security as well as identifying areas for future research. Utilising a modified version of the approach suggested by Okoli and Schabram (2010) 52 articles were considered for the review, of which 26 were included in the final product. Although many security issues and solutions were identified it has become apparent that much of the research being done only relates to the theoretical side. Thus this review shows that while plenty of issues have been identified future research should focus
APA, Harvard, Vancouver, ISO, and other styles
20

Dévigne, Clément. "Exécution sécurisée de plusieurs machines virtuelles sur une plateforme Manycore." Thesis, Paris 6, 2017. http://www.theses.fr/2017PA066138/document.

Full text
Abstract:
Les architectures manycore, qui comprennent un grand nombre de cœurs, sont un moyen de répondre à l'augmentation continue de la quantité de données numériques à traiter par les infrastructures proposant des services de cloud computing. Ces données, qui peuvent concerner des entreprises aussi bien que des particuliers, sont sensibles par nature, et c'est pourquoi la problématique d'isolation est primordiale. Or, depuis le début du développement du cloud computing, des techniques de virtualisation sont de plus en plus utilisées pour permettre à différents utilisateurs de partager physiquement le
APA, Harvard, Vancouver, ISO, and other styles
21

Dévigne, Clément. "Exécution sécurisée de plusieurs machines virtuelles sur une plateforme Manycore." Electronic Thesis or Diss., Paris 6, 2017. http://www.theses.fr/2017PA066138.

Full text
Abstract:
Les architectures manycore, qui comprennent un grand nombre de cœurs, sont un moyen de répondre à l'augmentation continue de la quantité de données numériques à traiter par les infrastructures proposant des services de cloud computing. Ces données, qui peuvent concerner des entreprises aussi bien que des particuliers, sont sensibles par nature, et c'est pourquoi la problématique d'isolation est primordiale. Or, depuis le début du développement du cloud computing, des techniques de virtualisation sont de plus en plus utilisées pour permettre à différents utilisateurs de partager physiquement le
APA, Harvard, Vancouver, ISO, and other styles
22

Andreoni, Lopez Martin Esteban. "Un système de surveillance et détection de menaces utilisant le traitement de flux comme une fonction virtuelle pour le Big Data." Thesis, Sorbonne université, 2018. http://www.theses.fr/2018SORUS035/document.

Full text
Abstract:
La détection tardive des menaces à la sécurité entraîne une augmentation significative du risque de dommages irréparables, invalidant toute tentative de défense. En conséquence, la détection rapide des menaces en temps réel est obligatoire pour l'administration de la sécurité. De plus, la fonction de virtualisation de la fonction réseau (NFV) offre de nouvelles opportunités pour des solutions de sécurité efficaces et à faible coût. Nous proposons un système de détection de menaces rapide et efficace basé sur des algorithmes de traitement de flux et d'apprentissage automatique. Les principales
APA, Harvard, Vancouver, ISO, and other styles
23

Grizzard, Julian B. "Towards Self-Healing Systems: Re-establishing Trust in Compromised Systems." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-04072006-133056/.

Full text
Abstract:
Thesis (Ph. D.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2006.<br>Schwan, Karsten, Committee Member ; Schimmel, David, Committee Member ; Copeland, John, Committee Member ; Owen, Henry, Committee Chair ; Wills, Linda, Committee Member.
APA, Harvard, Vancouver, ISO, and other styles
24

Mertlík, Tomáš. "Technologie NFC a její zabezpečení." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013. http://www.nusl.cz/ntk/nusl-220202.

Full text
Abstract:
The first objective of this paper is to describe the Android operating system. The chapter presents history and architecture regarding to all versions of the operating system. The significant part of chapter is focused on security. The second main topic of this paper is analysing the NFC (Near Field Communication) technology. This technology is based on an older contactless system RFID (Radio Frequency Communication), so RFID is described either. The NFC technology chapter contains the description of usability, history and the definitions of physical layer, link layer and NDEF (NFC Data Exchan
APA, Harvard, Vancouver, ISO, and other styles
25

Andreoni, Lopez Martin Esteban. "Un système de surveillance et détection de menaces utilisant le traitement de flux comme une fonction virtuelle pour le Big Data." Electronic Thesis or Diss., Sorbonne université, 2018. http://www.theses.fr/2018SORUS035.

Full text
Abstract:
La détection tardive des menaces à la sécurité entraîne une augmentation significative du risque de dommages irréparables, invalidant toute tentative de défense. En conséquence, la détection rapide des menaces en temps réel est obligatoire pour l'administration de la sécurité. De plus, la fonction de virtualisation de la fonction réseau (NFV) offre de nouvelles opportunités pour des solutions de sécurité efficaces et à faible coût. Nous proposons un système de détection de menaces rapide et efficace basé sur des algorithmes de traitement de flux et d'apprentissage automatique. Les principales
APA, Harvard, Vancouver, ISO, and other styles
26

Rasool, Muhammad Ahsan, and Shafiq Hafiz Muhammad. "Blockchain Technology : a new domain for Cyber Forensics." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-38242.

Full text
Abstract:
Traditional database with no prior security measures is becoming challenging in the era of data technology. Database storage on a central location with single point of failure and vulnerable to cyber attacks is getting exposed to big risk of being hacked with the evolution of powerful machines and modern hacking techniques. Since its commencement, the BlockChain technology has shown a promising performance for application buildup in diversed fields of life from cryptocurrency to smart contracts and decentralized applications. Although multiple studies on privacy, data confidentiality and secur
APA, Harvard, Vancouver, ISO, and other styles
27

Graff, Philippe. "Caractérisation, identification dans le réseau et optimisation du transport de trafic à faible latence - le cas du Cloud-Gaming." Electronic Thesis or Diss., Université de Lorraine, 2023. http://www.theses.fr/2023LORR0314.

Full text
Abstract:
Cette thèse s'intéresse au traitement du trafic à faible latence dans les réseaux, et en particulier aux services de type Cloud Gaming (CG) qui constituent notre cas d'étude. Ceux-ci ont fortement gagné en popularité et devraient représenter une part importante du trafic Internet dans les prochaines années. Or, les caractéristiques de leur trafic, à la fois haut débit et à faible latence, est exigeant pour les réseaux et rend difficile le maintien d'une bonne qualité de service (QoS) en conditions de réseau dégradées. Nous commençons par étudier le trafic de quatre plateformes de CG afin d'éva
APA, Harvard, Vancouver, ISO, and other styles
28

Loreti, Ludovico. "Pass The Hash attack. Panoramica, sperimentazione ed analisi." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/17297/.

Full text
Abstract:
La tesi è incentrata sul noto attacco informatico Pass The Hash e sul suo sviluppo all'interno di un sistema Microsoft Active Directory. Viene descritta una panoramica dell'attacco accennando la sua storia ed evoluzione fino ad oggi, alcuni dei tanti attacchi informatici ad esso propedeutici ed un background tecnico in cui vengono spiegate le sue componenti principali: il tool che viene utilizzato oggigiorno per sperimentare questa tecnica (Mimikatz), le funzioni di hash, i sistemi Single Sign-On, la suddivisione in domini, alberi e foreste di Active Directory. In seguito viene mostrato l'amb
APA, Harvard, Vancouver, ISO, and other styles
29

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Full text
Abstract:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciar
APA, Harvard, Vancouver, ISO, and other styles
30

Sadri, Sahba. "Towards Migrating Security Policies along with Virtual Machines in Cloud." Thesis, 2013. http://spectrum.library.concordia.ca/978154/1/Sadri_MASc_S2014.pdf.

Full text
Abstract:
Multi-tenancy and elasticity are important characteristics of every cloud. Multi-tenancy can be economical; however, it raises some security concerns. For example, contender companies may have Virtual Machines (VM) on the same server and have access to the same resources. There is always the possibility that one of them tries to get access to the opponent's data. In order to address these concerns, each tenant in the cloud should be secured separately and firewalls are one of the means that can help in that regard. Firewalls also protect virtual machines from the outside threats using access c
APA, Harvard, Vancouver, ISO, and other styles
31

Ahamed, Farhad. "Security aware virtual machine consolidation in cloud computing." Thesis, 2016. http://hdl.handle.net/1959.7/uws:38023.

Full text
Abstract:
Cloud Computing is a heterogeneous architecture, expanding on a broad range of technologies which provide several IT services. Many organisations have moved towards Cloud Computing architecture and hosting their data and services into the cloud-based data centres to reduce functional and maintenance cost. The increasing numbers of data centres are consuming significant power with an upward surge. In 2011, the energy consumed by data centres worldwide contributed to the 1.3% of the total global electricity usage. Hence, to preserve such huge energy and operating cost of data centres, the Cloud
APA, Harvard, Vancouver, ISO, and other styles
32

Wang, Chia-Wei, and 王嘉偉. "Facilitating Malware Sandbox with Security-Oriented Virtual Machine Introspection." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/9t3h2m.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Yap, Loong-Tern, and 葉龍騰. "A Study on Network Security and Management in Virtual Machine." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/8zqrzw.

Full text
Abstract:
碩士<br>淡江大學<br>資訊管理學系碩士班<br>102<br>The active use of virtualization technology and cloud services, enables easy acquisition of computing resources for corporations and enterprises. However as the increase in performance of virtualization software allows more virtual machines running on a single physical host. The current network structure and technologies does not have the required ability to effectively manage network services and requests for the virtual machines. This research will be studding currently available network management methods. Proposing a suggested management methods based on
APA, Harvard, Vancouver, ISO, and other styles
34

Hu, Ji [Verfasser]. "A virtual machine architecture for IT-security laboratories / von Ji Hu." 2006. http://d-nb.info/980935652/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

(9034865), Deepika Kaushal. "Bootstrapping a Private Cloud." Thesis, 2020.

Find full text
Abstract:
Cloud computing allows on-demand provision, configuration and assignment of computing resources with minimum cost and effort for users and administrators. Managing the physical infrastructure that underlies cloud computing services relies on the need to provision and manage bare-metal computer hardware. Hence there is a need for quick loading of operating systems in bare-metal and virtual machines to service the demands of users. The focus of the study is on developing a technique to load these machines remotely, which is complicated by the fact that the machines can be present in different Et
APA, Harvard, Vancouver, ISO, and other styles
36

Chang, Hung-hsun, and 張弘勳. "The Study of Critical Success Factors on the Using of Virtual Machine to Enhance Network Security of Organizations." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/59719839454611210432.

Full text
Abstract:
碩士<br>銘傳大學<br>資訊管理學系碩士在職專班<br>101<br>This paper discussed how to reduce existed network security problems of organizations and how to improve the organization&apos;&apos;s information management issues. The paper would identify the critical success factors. Main problem to deal with in this paper was to explore how to prevent hacking for the organization. The virtual machines and information security management should be combined to strengthen network security. The related critical success factors had been identifies. The study is to design for analyzing the effectiveness of Virtual Machi
APA, Harvard, Vancouver, ISO, and other styles
37

Van, Staden Wynand Johannes. "The use of a virtual machine as an access control mechanism in a relational database management system." Thesis, 2008. http://hdl.handle.net/10210/518.

Full text
Abstract:
This dissertation considers the use of a virtual machine as an access control mechanism in a relational database management system. Such a mechanism may prove to be more flexible than the normal access control mechanism that forms part of a relational database management system. The background information provided in this text (required to clearly comprehend the issues that are related to the virtual machine and its language) introduces databases, security and security mechanisms in relational database management systems. Finally, an existing implementation of a virtual machine that is used as
APA, Harvard, Vancouver, ISO, and other styles
38

Litty, Lionel. "Architectural Introspection and Applications." Thesis, 2010. http://hdl.handle.net/1807/24817.

Full text
Abstract:
Widespread adoption of virtualization has resulted in an increased interest in Virtual Machine (VM) introspection. To perform useful analysis of the introspected VMs, hypervisors must deal with the semantic gap between the low-level information available to them and the high-level OS abstractions they need. To bridge this gap, systems have proposed making assumptions derived from the operating system source code or symbol information. As a consequence, the resulting systems create a tight coupling between the hypervisor and the operating systems run by the introspected VMs. This coupling is un
APA, Harvard, Vancouver, ISO, and other styles
39

Roy, Indrajit. "Protecting sensitive information from untrusted code." Thesis, 2010. http://hdl.handle.net/2152/ETD-UT-2010-08-1951.

Full text
Abstract:
As computer systems support more aspects of modern life, from finance to health care, security is becoming increasingly important. However, building secure systems remains a challenge. Software continues to have security vulnerabilities due to reasons ranging from programmer errors to inadequate programming tools. Because of these vulnerabilities we need mechanisms that protect sensitive data even when the software is untrusted. This dissertation shows that secure and practical frameworks can be built for protecting users' data from untrusted applications in both desktop and cloud computin
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!