A Container-based Trusted Multi-level Security Mechanism

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-Level Security Applications

BlueSpace is an enterprise software company, based in Austin, Texas, which creates multi-level secure (MLS) end user applications that can span multiple networks at different classification levels. BlueSpace's middleware strategy facilitates rapid application development, infrastructure consolidation and infrastructure neutrality. The continuing growth in the number of networks in the defense a...

متن کامل

A Container-Based Virtual Laboratory for Internet Security e-Learning

Tele-Lab is a platform for e-learning in Internet security with a special focus on teaching by means of handson experience. A virtual laboratory is implemented for the provision of training environments for practical exercises. Tele-Lab uses virtual machine (VM) technology and virtual network devices. A VM is used to represent a physical computer in an exercise scenario. While every VM needs a ...

متن کامل

solution of security constrained unit commitment problem by a new multi-objective optimization method

چکیده-پخش بار بهینه به عنوان یکی از ابزار زیر بنایی برای تحلیل سیستم های قدرت پیچیده ،برای مدت طولانی مورد بررسی قرار گرفته است.پخش بار بهینه توابع هدف یک سیستم قدرت از جمله تابع هزینه سوخت ،آلودگی ،تلفات را بهینه می کند،و هم زمان قیود سیستم قدرت را نیز برآورده می کند.در کلی ترین حالتopf یک مساله بهینه سازی غیر خطی ،غیر محدب،مقیاس بزرگ،و ایستا می باشد که می تواند شامل متغیرهای کنترلی پیوسته و گ...

Applying a Multi-level Security Mechanism to a Network Address Translation Scheduler

In this paper, we consider a scheduling algorithm being applied with multi-level security that allows two or more hierarchical classification levels of information to be processed simultaneously. There are various load scheduling algorithms pre-built into the Linux Virtual Server system that have been tested and proven effective for distributing the load among the real servers. While these algo...

متن کامل

A mechanism for trusted agent-based workflow transport

Electronic workflow facilitates transactions between systems and enterprises. In this paper we employ socio-cognitive theory and technologies in the context of an agent-based workflow engine to facilitate partner selection and build trust among electronic workflow participants. These elements form useful and effective additions to the workflow context, by capturing business policy aspects. We p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ITM Web of Conferences

سال: 2017

ISSN: 2271-2097

DOI: 10.1051/itmconf/20171101002