期刊文献+
共找到930篇文章
< 1 2 47 >
每页显示 20 50 100
Light-Activated Virtual Sensor Array with Machine Learning for Non-Invasive Diagnosis of Coronary Heart Disease 被引量:1
1
作者 Jiawang Hu Hao Qian +2 位作者 Sanyang Han Ping Zhang Yuan Lu 《Nano-Micro Letters》 SCIE EI CAS CSCD 2024年第12期427-448,共22页
Early non-invasive diagnosis of coronary heart disease(CHD)is critical.However,it is challenging to achieve accurate CHD diagnosis via detecting breath.In this work,heterostructured complexes of black phosphorus(BP)an... Early non-invasive diagnosis of coronary heart disease(CHD)is critical.However,it is challenging to achieve accurate CHD diagnosis via detecting breath.In this work,heterostructured complexes of black phosphorus(BP)and two-dimensional carbide and nitride(MXene)with high gas sensitivity and photo responsiveness were formulated using a self-assembly strategy.A light-activated virtual sensor array(LAVSA)based on BP/Ti_(3)C_(2)Tx was prepared under photomodulation and further assembled into an instant gas sensing platform(IGSP).In addition,a machine learning(ML)algorithm was introduced to help the IGSP detect and recognize the signals of breath samples to diagnose CHD.Due to the synergistic effect of BP and Ti_(3)C_(2)Tx as well as photo excitation,the synthesized heterostructured complexes exhibited higher performance than pristine Ti_(3)C_(2)Tx,with a response value 26%higher than that of pristine Ti_(3)C_(2)Tx.In addition,with the help of a pattern recognition algorithm,LAVSA successfully detected and identified 15 odor molecules affiliated with alcohols,ketones,aldehydes,esters,and acids.Meanwhile,with the assistance of ML,the IGSP achieved 69.2%accuracy in detecting the breath odor of 45 volunteers from healthy people and CHD patients.In conclusion,an immediate,low-cost,and accurate prototype was designed and fabricated for the noninvasive diagnosis of CHD,which provided a generalized solution for diagnosing other diseases and other more complex application scenarios. 展开更多
关键词 Black phosphorus/MXene heterostructures Light-activated virtual sensor array Diagnosis of coronary heart disease machine learning
在线阅读 下载PDF
A Quantitative Security Metric Model for Security Controls:Secure Virtual Machine Migration Protocol as Target of Assessment 被引量:1
2
作者 Tayyaba Zeb Muhammad Yousaf +1 位作者 Humaira Afzal Muhammad Rafiq Mufti 《China Communications》 SCIE CSCD 2018年第8期126-140,共15页
Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the... Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the security controls. However, defining enterprise-level security metrics has already been listed as one of the hard problems in the Info Sec Research Council's hard problems list. Almost all the efforts in defining absolute security metrics for the enterprise security have not been proved fruitful. At the same time, with the maturity of the security industry, there has been a continuous emphasis from the regulatory bodies on establishing measurable security metrics. This paper addresses this need and proposes a relative security metric model that derives three quantitative security metrics named Attack Resiliency Measure(ARM), Performance Improvement Factor(PIF), and Cost/Benefit Measure(CBM) for measuring the performance of the security controls. For the effectiveness evaluation of the proposed security metrics, we took the secure virtual machine(VM) migration protocol as the target of assessment. The virtual-ization technologies are rapidly changing the landscape of the computing world. Devising security metrics for virtualized environment is even more challenging. As secure virtual machine migration is an evolving area and no standard protocol is available specifically for secure VM migration. This paper took the secure virtual machine migration protocol as the target of assessment and applied the proposed relative security metric model for measuring the Attack Resiliency Measure, Performance Improvement Factor, and Cost/Benefit Measure of the secure VM migration protocol. 展开更多
关键词 attack resiliency measure cost-benefit measure performance improvement factor security assessment formal verification security controls security metrics virtual machine migration protocol
在线阅读 下载PDF
Application-Transparent Live Migration for Virtual Machine on Network Security Enhanced Hypervisor 被引量:2
3
作者 陈贤钦 高小鹏 +2 位作者 万寒 王素梅 龙翔 《China Communications》 SCIE CSCD 2011年第3期32-42,共11页
As the number of Virtual Machines(VMs) consolidated on single physical server increases with the rapid advance of server hardware,virtual network turns complex and frangible.Modern Network Security Engines(NSE) are in... As the number of Virtual Machines(VMs) consolidated on single physical server increases with the rapid advance of server hardware,virtual network turns complex and frangible.Modern Network Security Engines(NSE) are introduced to eradicate the intrusions occurring in the virtual network.In this paper,we point out the inadequacy of the present live migration implementation,which hinders itself from providing transparent VM relocation between hypervisors equipped with Network Security Engines(NSE-H).This occurs because the current implementation ignores VM-related Security Context(SC) required by NSEs embedded in NSE-H.We present the CoM,a comprehensive live migration framework,for NSE-H-based virtualization computing environment.We built a prototype system on Xen hypervisors to evaluate our framework,and conduct experiments under various realistic application environments.The results demonstrate that our solution successfully fixes the inadequacy of the present live migration implementation,and the performance overhead is negligible. 展开更多
关键词 live migration network security security context virtualIZATION
在线阅读 下载PDF
Machine learning seismic reservoir prediction method based on virtual sample generation 被引量:6
4
作者 Kai-Heng Sang Xing-Yao Yin Fan-Chang Zhang 《Petroleum Science》 SCIE CAS CSCD 2021年第6期1662-1674,共13页
Seismic reservoir prediction plays an important role in oil exploration and development.With the progress of artificial intelligence,many achievements have been made in machine learning seismic reservoir prediction.Ho... Seismic reservoir prediction plays an important role in oil exploration and development.With the progress of artificial intelligence,many achievements have been made in machine learning seismic reservoir prediction.However,due to the factors such as economic cost,exploration maturity,and technical limitations,it is often difficult to obtain a large number of training samples for machine learning.In this case,the prediction accuracy cannot meet the requirements.To overcome this shortcoming,we develop a new machine learning reservoir prediction method based on virtual sample generation.In this method,the virtual samples,which are generated in a high-dimensional hypersphere space,are more consistent with the original data characteristics.Furthermore,at the stage of model building after virtual sample generation,virtual samples screening and model iterative optimization are used to eliminate noise samples and ensure the rationality of virtual samples.The proposed method has been applied to standard function data and real seismic data.The results show that this method can improve the prediction accuracy of machine learning significantly. 展开更多
关键词 virtual sample machine learning Reservoir prediction Hypersphere characteristic equation
在线阅读 下载PDF
Energy-Efficient Framework for Virtual Machine Consolidation in Cloud Data Centers 被引量:1
5
作者 Kejing He Zhibo Li +1 位作者 Dongyan Deng Yanhua Chen 《China Communications》 SCIE CSCD 2017年第10期192-201,共10页
With the advent of the era of cloud computing, the high energy consumption of cloud computing data centers has become a prominent problem, and how to reduce the energy consumption of cloud computing data center and im... With the advent of the era of cloud computing, the high energy consumption of cloud computing data centers has become a prominent problem, and how to reduce the energy consumption of cloud computing data center and improve the efficiency of data center has become the research focus of researchers all the world. In a cloud environment, virtual machine consolidation(VMC) is an effective strategy that can improve the energy efficiency. However, at the same time, in the process of virtual machine consolidation, we need to deal with the tradeoff between energy consumption and excellent service performance to meet service level agreement(SLA). In this paper, we propose a new virtual machine consolidation framework for achieving better energy efficiency-Improved Underloaded Decision(IUD) algorithm and Minimum Average Utilization Difference(MAUD) algorithm. Finally, based on real workload data on Planet Lab, experiments have been done with the cloud simulation platform Cloud Sim. The experimental result shows that the proposed algorithm can reduce the energy consumption and SLA violation of data centers compared with existing algorithms, improving the energy efficiency of data centers. 展开更多
关键词 cloud computing virtual machine consolidation energy efficiency virtual machine migration
在线阅读 下载PDF
A Mandatory Access Control Framework in Virtual Machine System with Respect to Multi-level Security I: Theory 被引量:1
6
作者 LIU Qian WANG Guanhai WENG Chuliang LUO Yuan LI Minglu 《China Communications》 SCIE CSCD 2010年第4期137-143,共7页
At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access con... At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access control (MAC) and MLS in virtual machine system,this paper designs Virt-BLP model,which is based on BLP model.For the distinction between virtual machine system and non-virtualized system,we build elements and security axioms of Virt-BLP model by modifying those of BLP.Moreover,comparing with BLP,the number of state transition rules of Virt-BLP is reduced accordingly and some rules can only be enforced by trusted subject.As a result,Virt-BLP model supports MAC and partial discretionary access control (DAC),well satisfying the requirement of MLS in virtual machine system.As space is limited,the implementation of our MAC framework will be shown in a continuation. 展开更多
关键词 virtual machine System Mandatory Access Control Multi-level Security Virt-BLP
在线阅读 下载PDF
Energy-Performance Tradeoffs in laaS Cloud with Virtual Machine Scheduling 被引量:3
7
作者 DONG Jiankang WANG Hongbo CHENG Shiduan 《China Communications》 SCIE CSCD 2015年第2期155-166,共12页
In the cloud data centers,how to map virtual machines(VMs) on physical machines(PMs) to reduce the energy consumption is becoming one of the major issues,and the existing VM scheduling schemes are mostly to reduce ene... In the cloud data centers,how to map virtual machines(VMs) on physical machines(PMs) to reduce the energy consumption is becoming one of the major issues,and the existing VM scheduling schemes are mostly to reduce energy consumption by optimizing the utilization of physical servers or network elements.However,the aggressive consolidation of these resources may lead to network performance degradation.In view of this,this paper proposes a two-stage VM scheduling scheme:(1) We propose a static VM placement scheme to minimize the number of activating PMs and network elements to reduce the energy consumption;(2) In the premise of minimizing the migration costs,we propose a dynamic VM migration scheme to minimize the maximum link utilization to improve the network performance.This scheme makes a tradeoff between energy efficiency and network performance.We design a new twostage heuristic algorithm for a solution,and the simulations show that our solution achieves good results. 展开更多
关键词 IaaS cloud virtual machine scheduling network performance energy efficiency
在线阅读 下载PDF
Multiway Dynamic Trust Chain Model on Virtual Machine for Cloud Computing 被引量:1
8
作者 Jie Zhu Guoyuan Lin +2 位作者 Fucheng You Huaqun Liu Chunru Zhou 《China Communications》 SCIE CSCD 2016年第7期83-91,共9页
This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the cloud.To secure the factors,a multiway dynamic trust chain transfer model was proposed... This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the cloud.To secure the factors,a multiway dynamic trust chain transfer model was proposed on the basis of a measurement interactive virtual machine and current behavior to protect the integrity of the system.A trust chain construction module is designed in a virtual machine monitor.Through dynamic monitoring,it achieves the purpose of transferring integrity between virtual machine.A cloud system with a trust authentication function is implemented on the basis of the model,and its practicability is shown. 展开更多
关键词 cloud computing virtual machine trustworthiness measurement dynamic trust transfer
在线阅读 下载PDF
Heuristic Virtual Machine Allocation for Multi-Tier Ambient Assisted Living Applications in a Cloud Data Center
9
作者 Jing Bi Haitao Yuan +1 位作者 Ming Tie Xiao Song 《China Communications》 SCIE CSCD 2016年第5期56-65,共10页
Cloud computing provides the essential infrastructure for multi-tier Ambient Assisted Living(AAL) applications that facilitate people's lives. Resource provisioning is a critically important problem for AAL applic... Cloud computing provides the essential infrastructure for multi-tier Ambient Assisted Living(AAL) applications that facilitate people's lives. Resource provisioning is a critically important problem for AAL applications in cloud data centers(CDCs). This paper focuses on modeling and analysis of multi-tier AAL applications, and aims to optimize resource provisioning while meeting requests' response time constraint. This paper models a multi-tier AAL application as a hybrid multi-tier queueing model consisting of an M/M/c queueing model and multiple M/M/1 queueing models. Then, virtual machine(VM) allocation is formulated as a constrained optimization problem in a CDC, and is further solved with the proposed heuristic VM allocation algorithm(HVMA). The results demonstrate that the proposed model and algorithm can effectively achieve dynamic resource provisioning while meeting the performance constraint. 展开更多
关键词 ambient assisted living cloud computing resource provisioning virtual machine heuristic optimization
在线阅读 下载PDF
Service Function Chain Migration in LEO Satellite Networks
10
作者 Geng Yuhui Wang Niwei +5 位作者 Chen Xi Xu Xiaofan Zhou Changsheng Yang Junyi Xiao Zhenyu Cao Xianbin 《China Communications》 SCIE CSCD 2024年第3期247-259,共13页
With the advancements of software defined network(SDN)and network function virtualization(NFV),service function chain(SFC)placement becomes a crucial enabler for flexible resource scheduling in low earth orbit(LEO)sat... With the advancements of software defined network(SDN)and network function virtualization(NFV),service function chain(SFC)placement becomes a crucial enabler for flexible resource scheduling in low earth orbit(LEO)satellite networks.While due to the scarcity of bandwidth resources and dynamic topology of LEO satellites,the static SFC placement schemes may cause performance degradation,resource waste and even service failure.In this paper,we consider migration and establish an online migration model,especially considering the dynamic topology.Given the scarcity of bandwidth resources,the model aims to maximize the total number of accepted SFCs while incurring as little bandwidth cost of SFC transmission and migration as possible.Due to its NP-hardness,we propose a heuristic minimized dynamic SFC migration(MDSM)algorithm that only triggers the migration procedure when new SFCs are rejected.Simulation results demonstrate that MDSM achieves a performance close to the upper bound with lower complexity. 展开更多
关键词 network function virtualization(NFV) resource allocation satellite networks service function chain(SFC) SFC migration SFC placement soft-ware defined network(SDN)
在线阅读 下载PDF
基于AI技术的影视虚拟角色创制:从数字仿真到智能共创
11
作者 周雯 赵恬 《现代电影技术》 2025年第1期16-22,共7页
为深入探究艺术创作领域从计算机合成虚拟角色到人工智能(AI)深度参与的人机共创模式的演变历程、作用机制及其深远影响,本文通过梳理AI技术在影视与舞台艺术中的应用历程,利用案例分析和理论阐述,提出AI正从辅助工具向共创主体转变的... 为深入探究艺术创作领域从计算机合成虚拟角色到人工智能(AI)深度参与的人机共创模式的演变历程、作用机制及其深远影响,本文通过梳理AI技术在影视与舞台艺术中的应用历程,利用案例分析和理论阐述,提出AI正从辅助工具向共创主体转变的论点。通过对AI在虚拟角色构建、人工智能生成内容(AIGC)驱动的艺术创作过程以及人机共创路径等方面的详尽剖析,发现AI技术的持续演进显著增强了虚拟角色的表现力,革新了艺术创作内容的生成模式,为艺术创作注入诸多创新元素,带来沉浸式体验;然而,这一进程也引发了伦理与身份界定等复杂问题,如虚拟角色行为责任归属不明、引发观众情感依赖等。未来,AI虚拟角色可能在跨文化交流中发挥重要桥梁作用,AI的深度参与有望推动艺术创作朝着虚拟与现实深度融合、多元文化体验拓展的方向持续发展。 展开更多
关键词 人工智能 虚拟角色 AIGC 人机共创 数字仿真
在线阅读 下载PDF
基于虚拟同步和转速限制的飞轮储能双馈电机调相系统的频率支撑技术
12
作者 寇建 刘宏勇 +2 位作者 于维耀 戴嘉庚 姚芳 《可再生能源》 北大核心 2025年第2期252-259,共8页
电网频率跌落时,并网双馈电机向电网补偿有功功率,对电网频率具有一定的支撑或抬升作用,但频率跌落期间,双馈电机转子转速下降快且不可控、有功补偿及频率支撑的时长有限,无法保障双馈电机稳定运行。文章提出了一种基于虚拟同步和转速... 电网频率跌落时,并网双馈电机向电网补偿有功功率,对电网频率具有一定的支撑或抬升作用,但频率跌落期间,双馈电机转子转速下降快且不可控、有功补偿及频率支撑的时长有限,无法保障双馈电机稳定运行。文章提出了一种基于虚拟同步和转速限制的飞轮储能双馈电机频率支撑技术,该技术首先在双馈电机转子转轴上外挂飞轮,增大了系统惯量、增加机械储能,延缓频率跌落过程中转子下降速率;其次,在电网频率跌落时,通过虚拟同步控制策略进行有功功率的实时补偿,基于转子转速下限值的动态控制,调控有功功率的补偿时间,配合飞轮储能实现有功补偿时长的优化控制;最后,在Matlab/Simulink中对调相系统频率支撑技术的有效性进行验证。 展开更多
关键词 双馈电机 频率跌落 有功补偿 飞轮储能 虚拟同步
在线阅读 下载PDF
舰艇公共计算环境虚拟机优化部署策略研究
13
作者 杨素雨 王君珺 +1 位作者 朱伟 闫仲秋 《吉林大学学报(信息科学版)》 2025年第1期134-142,共9页
由于舰艇公共计算环境是通过虚拟化技术整合计算存储资源,构建舰艇公共基础设施平台,但功耗较大。为降低舰艇公共计算环境的能耗水平,需要优化虚拟机部署策略,因此对比了常用的几种虚拟机优化部署方法,并提出一种基于改进花授粉算法的... 由于舰艇公共计算环境是通过虚拟化技术整合计算存储资源,构建舰艇公共基础设施平台,但功耗较大。为降低舰艇公共计算环境的能耗水平,需要优化虚拟机部署策略,因此对比了常用的几种虚拟机优化部署方法,并提出一种基于改进花授粉算法的舰艇公共计算环境虚拟机部署策略。设计改进的最大最小距离法应用于初始种群生成过程,以提高初始解的质量。通过引入混合蛙跳算法,提出具有信息交换机制的局部搜索策略。同时,提出自适应切换概率策略,以平衡全局与局部授粉,生成虚拟机映射到服务器的优化部署方案。通过仿真实验验证,所提出的虚拟机部署优化策略能显著降低舰艇公共计算环境的能耗水平。 展开更多
关键词 公共计算环境 能耗 虚拟机部署 花授粉算法
在线阅读 下载PDF
VirtualBox虚拟机的隐性加载探讨 被引量:1
14
作者 鱼泳 《数字技术与应用》 2013年第9期197-198,共2页
在数字化校园建设中,采用Oracle公司的VirtualBox虚拟化软件管理虚拟服务器,使用VBoxManage命令和批处理文件,实现VirtualBox虚拟机的无窗口启动和关闭,便于大规模的管理虚拟服务器应用和虚拟机自动启动。
关键词 virtualBOX 虚拟机 隐性加载
在线阅读 下载PDF
高端酒瓶丝带的自动捆扎装置设计
15
作者 郑兆启 郭苗苗 《包装与食品机械》 北大核心 2025年第1期40-47,共8页
针对部分高端酒瓶人工捆扎丝带的效率低和成本高等问题,设计一款丝带自动捆扎装置,以实现丝带的打结和系紧等工作。完成自动捆扎装置的机械结构总体设计,对绳环成形过程进行力学分析,构建夹持机构与丝带在绳环成形过程中的力学模型;利用... 针对部分高端酒瓶人工捆扎丝带的效率低和成本高等问题,设计一款丝带自动捆扎装置,以实现丝带的打结和系紧等工作。完成自动捆扎装置的机械结构总体设计,对绳环成形过程进行力学分析,构建夹持机构与丝带在绳环成形过程中的力学模型;利用ADAMS软件建立完整的捆扎装置虚拟样机;制作实体样机并进行试验。结果表明,丝带两端所需的最小夹持力分别为0.794,0.796 N,虚拟丝带的成形形状与样机试验中绳子成形形状相符,验证了所采用的柔性绳索建模方法的正确性;试验样机运行稳定,平均单次打结时长为8.2 s,打结成功率为96%。研究为柔性材料打结装置的研制提供理论基础。 展开更多
关键词 丝带捆扎装置 ADAMS软件 轴套力连接 虚拟样机
在线阅读 下载PDF
风电场变流器控制策略对电网稳定性的影响
16
作者 范晨煜 《通信电源技术》 2025年第1期92-94,共3页
随着风电并网规模不断扩大,变流器控制技术对电网稳定性的影响日益显著。研究表明,适当的变流器控制策略可以提高系统的动态性能,增强电网的抗扰动能力。通过仿真实验和实际测试,分析了不同控制参数对电压稳定性、频率响应及故障穿越能... 随着风电并网规模不断扩大,变流器控制技术对电网稳定性的影响日益显著。研究表明,适当的变流器控制策略可以提高系统的动态性能,增强电网的抗扰动能力。通过仿真实验和实际测试,分析了不同控制参数对电压稳定性、频率响应及故障穿越能力的影响。结果显示,采用先进的变流器控制策略,如虚拟同步机控制、自适应下垂控制及多目标优化控制,可有效改善电网的稳定性指标,为大规模风电并网提供技术支撑。 展开更多
关键词 风电场 变流器控制 电网稳定性 虚拟同步机 自适应下垂控制
在线阅读 下载PDF
An Effective and Scalable VM Migration Strategy to Mitigate Cross-VM Side-Channel Attacks in Cloud 被引量:3
17
作者 Chao Yang Yunfei Guo +2 位作者 Hongchao Hu Wenyan Liu Yawen Wang 《China Communications》 SCIE CSCD 2019年第4期151-171,共21页
Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immedi... Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immediate deployment due to their requirement for modification of virtualization structure, we adopt dynamic migration, an inherent mechanism of the cloud platform, as a general defense against this kind of threats. To this end, we first set up a unified practical information leakage model which shows the factors affecting side channels and describes the way they influence the damage due to side-channel attacks. Since migration is adopted to limit the time duration of co-residency, we envision this defense as an optimization problem by setting up an Integer Linear Programming(ILP) to calculate optimal migration strategy, which is intractable due to high computational complexity. Therefore, we approximate the ILP with a baseline genetic algorithm, which is further improved for its optimality and scalability. Experimental results show that our migration-based defense can not only provide excellent security guarantees and affordable performance cost in both theoretical simulation and practical cloud environment, but also achieve better optimality and scalability than previous countermeasures. 展开更多
关键词 side-channel ATTACKS information LEAKAGE virtual machine migration GENETIC algorithm
在线阅读 下载PDF
Multiple attacks on virtualization-based security monitoring
18
作者 闫广禄 罗森林 +1 位作者 韦伟 潘丽敏 《Journal of Beijing Institute of Technology》 EI CAS 2016年第2期254-263,共10页
Three kinds of vulnerabilities that may exist in some of current virtualization-based security monitoring systems were proposed: page mapping problem,lack of overall protection,and inherent limitations. Aiming at the... Three kinds of vulnerabilities that may exist in some of current virtualization-based security monitoring systems were proposed: page mapping problem,lack of overall protection,and inherent limitations. Aiming at these vulnerabilities,relative attack methods were presented in detail. Our experiments show that the attack methods,such as page mapping attack,data attack,and non-behavior detection attack,can attack simulated or original security monitors successfully. Defenders,who need to effectively strengthen their security monitors,can get an inspiration from these attack methods and find some appropriate solutions. 展开更多
关键词 virtualIZATION VULNERABILITY attack method security threat virtual machine monitor
在线阅读 下载PDF
Investigating the Implications of Virtualization for Digital Forensics
19
作者 Song Zheng Jin Bo +1 位作者 Zhu Yinghong Sun Yongqing 《China Communications》 SCIE CSCD 2010年第6期100-106,共7页
Research in virtualization technology has gained significant developments in recent years, which brings not only opportunities to the forensic community, but challenges as well. This paper discusses the potential role... Research in virtualization technology has gained significant developments in recent years, which brings not only opportunities to the forensic community, but challenges as well. This paper discusses the potential roles of virtualization in digital forensics, examines the recent progresses which use the virtualization techniques to support modem computer forensics. The influences on digital forensics caused by virtualization technology are identified. Tools and methods in common digital forensic practices are analyzed, and experiences of our practice and reflections in this field are shared. 展开更多
关键词 digital forensics virtualIZATION forensic image booting virtual machine introspection
在线阅读 下载PDF
Hash Tree Based Trustworthiness Verification Mechanism in Virtual Environment
20
作者 ZHU Shuaishuai HAN Yiliang +1 位作者 YANG Xiaoyuan WEI Yuechuan 《China Communications》 SCIE CSCD 2016年第3期184-192,共9页
The trustworthiness of virtual machines is a big security issue in cloud computing. In this paper, we aimed at designing a practical trustworthiness mechanism in virtual environment. With the assist of a third certifi... The trustworthiness of virtual machines is a big security issue in cloud computing. In this paper, we aimed at designing a practical trustworthiness mechanism in virtual environment. With the assist of a third certificate agent, the cloud user generates a trust base and extends it to its VMs. For each service running on the VM, a hash value is generated from all the necessary modules, and these hash values are organized and maintained with a specially designed hash tree whose root is extended from the user's trust base. Before the VM loads a service, the hash tree is verified from the coordinated hash value to check the trustworthiness of the service. 展开更多
关键词 trustworthiness verification virtual environment hash tree virtual machine
在线阅读 下载PDF
上一页 1 2 47 下一页 到第
使用帮助 返回顶部