Survey on multi-access edge computing security and privacy
P Ranaweera, AD Jurcut… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm
of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in …
of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in …
System and method for validating program execution at run-time
K Ghose - US Patent 9,767,271, 2017 - Google Patents
(57) ABSTRACT A pipelined processor comprising a cache memory system, fetching
instructions for execution from a portion of said cache memory system, an instruction …
instructions for execution from a portion of said cache memory system, an instruction …
Automatically generating volume images and launching virtual computing instances
M Tripoli, B Moyles - US Patent 9,430,212, 2016 - Google Patents
In an embodiment, a method comprises using a first server computer, executing a process
that is configured to generate virtual computer instances; receiving a request to generate a …
that is configured to generate virtual computer instances; receiving a request to generate a …
Virtual machine trust isolation in a cloud environment
SF Crowell, JA Nikolai… - US Patent App. 13/969,705, 2015 - Google Patents
SUMMARY 0005 Embodiments presented herein include a method of enforcing virtual
machine trust isolation in a cloud environ ment. This method may generally include …
machine trust isolation in a cloud environ ment. This method may generally include …
Operating system layering
JM Engel, FJ Smith, HR Pulapaka, BM Schultz… - US Patent …, 2018 - Google Patents
Techniques for implementing operating system layering are described herein. In one
example, a method includes managing one or more container temporary storage spaces …
example, a method includes managing one or more container temporary storage spaces …
Method and apparatus for virtual machine trust isolation in a cloud environment
SF Crowell, JA Nikolai… - US Patent App. 14/057,321, 2015 - Google Patents
Techniques are disclosed for virtual machine trust isolation in an Infrastructure-as-a-Service
(IaaS) cloud environment. More specifically, embodiments of the invention monitor levels of …
(IaaS) cloud environment. More specifically, embodiments of the invention monitor levels of …
Fast virtual machine storage allocation with encrypted storage
HH Van Riel, NN Lal - US Patent 10,474,382, 2019 - Google Patents
Abstract Systems and methods for fast storage allocation for encrypted storage are
disclosed. An example method may include receiving, by a processing device executing a …
disclosed. An example method may include receiving, by a processing device executing a …
Continued verification and monitoring of application code in containerized execution environment
J Vyas, S Marthi - US Patent 10,666,443, 2020 - Google Patents
A method includes receiving, by a processing device executing a validation service, a
validation data associated with a first instance of an execution environment, the validation …
validation data associated with a first instance of an execution environment, the validation …
Lazy transmission of memory pages during checkpointing
US Patent 10,095,583, 2018 - Google Patents
During checkpointing of a virtual computing instance running in a first host computer,
memory pages that have been modified during a checkpoint time interval are lazily …
memory pages that have been modified during a checkpoint time interval are lazily …
Framework to facilitate taking snapshots of web application on demand
MD Parikh, R Vijayvargiya - US Patent 10,649,864, 2020 - Google Patents
Various systems and methods are provided for capturing and storing state information and
other data being used by a web application. For example, one method involves capturing …
other data being used by a web application. For example, one method involves capturing …