Memory resource management in VMware ESX server
CA Waldspurger - ACM SIGOPS Operating Systems Review, 2002 - dl.acm.org
VMware ESX Server is a thin software layer designed to multiplex hardware resources
efficiently among virtual machines running unmodified commodity operating systems. This …
efficiently among virtual machines running unmodified commodity operating systems. This …
FARSITE: Federated, available, and reliable storage for an incompletely trusted environment
Farsite is a secure, scalable file system that logically functions as a centralized file server but
is physically distributed among a set of untrusted computers. Farsite provides file availability …
is physically distributed among a set of untrusted computers. Farsite provides file availability …
[图书][B] IT-Sicherheit: Konzepte–Verfahren–Protokolle
C Eckert - 2013 - degruyter.com
Literaturverzeichnis Page 1 Literaturverzeichnis [1] 3GPP. Design of the UMTS Cipher and
Integrity Functions. [2] 3GPP. UMTS Security Architecture. [3] Martın Abadi and Roger M …
Integrity Functions. [2] 3GPP. UMTS Security Architecture. [3] Martın Abadi and Roger M …
[PDF][PDF] Efficient, transparent, and comprehensive runtime code manipulation
D Bruening, S Amarasinghe - 2004 - burningcutlery.com
This thesis addresses the challenges of building a software system for general-purpose
runtime code manipulation. Modern applications, with dynamically-loaded modules and …
runtime code manipulation. Modern applications, with dynamically-loaded modules and …
Understanding data lifetime via whole system simulation
J Chow, B Pfaff, T Garfinkel, K Christopher… - USENIX Security …, 2004 - usenix.org
Strictly limiting the lifetime (ie propagation and duration of exposure) of sensitive data (eg
passwords) is an important and well accepted practice in secure software development …
passwords) is an important and well accepted practice in secure software development …
Fast detection of scanning worm infections
SE Schechter, J Jung, AW Berger - … September 15-17, 2004. Proceedings 7, 2004 - Springer
Worm detection and response systems must act quickly to identify and quarantine scanning
worms, as when left unchecked such worms have been able to infect the majority of …
worms, as when left unchecked such worms have been able to infect the majority of …
[PDF][PDF] Automatic Misconfiguration Troubleshooting with PeerPressure.
Technical support contributes 17% of the total cost of ownership of today's desktop PCs [25].
An important element of technical support is troubleshooting misconfigured applications …
An important element of technical support is troubleshooting misconfigured applications …
[图书][B] The inlined reference monitor approach to security policy enforcement
U Erlingsson - 2004 - search.proquest.com
Embedding security enforcement code into applications is an alternative to traditional
security mechanisms. This dissertation supports the thesis that such Inlined Reference …
security mechanisms. This dissertation supports the thesis that such Inlined Reference …
Bringing virtualization to the x86 architecture with the original vmware workstation
E Bugnion, S Devine, M Rosenblum… - ACM Transactions on …, 2012 - dl.acm.org
This article describes the historical context, technical challenges, and main implementation
techniques used by VMware Workstation to bring virtualization to the x86 architecture in …
techniques used by VMware Workstation to bring virtualization to the x86 architecture in …