Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Szefer, Jakub Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 3 of 3 reviews    
  Principles of secure processor architecture design
Szefer J., Morgan&Claypool Publishers, San Rafael, CA, 2018. 173 pp.  Type: Book (978-1-681730-01-1)

The growing use of processors where multiple applications are executed concurrently, as in cloud computing, has increased the need for security features that can protect these applications from mutual interference. Additionally, a succ...
...
Jun 25 2021  
  Characterizing hypervisor vulnerabilities in cloud computing servers
Perez-Botero D., Szefer J., Lee R.  CloudComputing 2013 (Proceedings of the 2013 International Workshop on Security in Cloud Computing, Hangzhou, China, May 8, 2013) 3-10, 2013.  Type: Proceedings, Reviews: (2 of 2)

Security, in every application of the concept, is a constantly moving target: once defenders identify and patch a vulnerability, attackers move on to the next weak spot. Efforts are therefore required to track the path of exposures thr...
...
Oct 9 2013  
  Characterizing hypervisor vulnerabilities in cloud computing servers
Perez-Botero D., Szefer J., Lee R.  CloudComputing 2013 (Proceedings of the 2013 International Workshop on Security in Cloud Computing, Hangzhou, China, May 8, 2013) 3-10, 2013.  Type: Proceedings, Reviews: (1 of 2)

Cloud computing security issues can make or break the confidence of consumers and industries considering the adoption of cloud services. One of the most important security threats in cloud platforms involves attacks at the hypervisor l...
...
Oct 8 2013  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy