Survey on multi-access edge computing security and privacy

P Ranaweera, AD Jurcut… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm
of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in …

System and method for validating program execution at run-time

K Ghose - US Patent 9,767,271, 2017 - Google Patents
(57) ABSTRACT A pipelined processor comprising a cache memory system, fetching
instructions for execution from a portion of said cache memory system, an instruction …

Automatically generating volume images and launching virtual computing instances

M Tripoli, B Moyles - US Patent 9,430,212, 2016 - Google Patents
In an embodiment, a method comprises using a first server computer, executing a process
that is configured to generate virtual computer instances; receiving a request to generate a …

Virtual machine trust isolation in a cloud environment

SF Crowell, JA Nikolai… - US Patent App. 13/969,705, 2015 - Google Patents
SUMMARY 0005 Embodiments presented herein include a method of enforcing virtual
machine trust isolation in a cloud environ ment. This method may generally include …

Operating system layering

JM Engel, FJ Smith, HR Pulapaka, BM Schultz… - US Patent …, 2018 - Google Patents
Techniques for implementing operating system layering are described herein. In one
example, a method includes managing one or more container temporary storage spaces …

Method and apparatus for virtual machine trust isolation in a cloud environment

SF Crowell, JA Nikolai… - US Patent App. 14/057,321, 2015 - Google Patents
Techniques are disclosed for virtual machine trust isolation in an Infrastructure-as-a-Service
(IaaS) cloud environment. More specifically, embodiments of the invention monitor levels of …

Fast virtual machine storage allocation with encrypted storage

HH Van Riel, NN Lal - US Patent 10,474,382, 2019 - Google Patents
Abstract Systems and methods for fast storage allocation for encrypted storage are
disclosed. An example method may include receiving, by a processing device executing a …

Continued verification and monitoring of application code in containerized execution environment

J Vyas, S Marthi - US Patent 10,666,443, 2020 - Google Patents
A method includes receiving, by a processing device executing a validation service, a
validation data associated with a first instance of an execution environment, the validation …

Lazy transmission of memory pages during checkpointing

US Patent 10,095,583, 2018 - Google Patents
During checkpointing of a virtual computing instance running in a first host computer,
memory pages that have been modified during a checkpoint time interval are lazily …

Framework to facilitate taking snapshots of web application on demand

MD Parikh, R Vijayvargiya - US Patent 10,649,864, 2020 - Google Patents
Various systems and methods are provided for capturing and storing state information and
other data being used by a web application. For example, one method involves capturing …