Velox VM: A safe execution environment for resource-constrained IoT applications
نویسندگان
چکیده
منابع مشابه
A Distributed Security Mechanism for Resource-Constrained IoT Devices
Internet of Things (IoT) devices have developed to comprise embedded systems and sensors with the ability to connect, collect, and transmit data over the Internet. Although solutions to secure IoT systems exist, Class-0 IoT devices with insufficient resources to support such solutions are considered a resourceconstrained in terms of secure communication. This paper provides a distributed securi...
متن کاملSUEZ: A Distributed Safe Execution Environment for System Administration Trials
In this paper, we address the problem of safely and conveniently performing ‘‘trial’’ experiments in system administration tasks. System administrators often perform such trial executions that involve installing new software or experimenting with features of existing software. Often such trials require testing of software that run on multiple hosts. For instance, experimenting with a typical cl...
متن کاملStorage-Centric System Architectures for Networked, Resource-Constrained Devices
Tsiftes, N. 2016. Storage-Centric System Architectures for Networked, ResourceConstrained Devices. Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology 1331. 60 pp. Uppsala: Acta Universitatis Upsaliensis. ISBN 978-91-554-9441-4. The emergence of the Internet of Things (IoT) has increased the demand for networked, resource-constrained devices treme...
متن کاملA THEORETICALLY CORRECT RESOURCE USAGE VISUALIZATION FOR THE RESOURCE-CONSTRAINED PROJECT SCHEDULING PROBLEM
The cumulative resource constraints of the resource-constrained project scheduling problem (RCPSP) do not treat the resource demands as geometric rectangles, that is, activities are not necessarily assigned to the same resource units over their processing times. In spite of this fact, most papers on resource-constrained project scheduling mainly in the motivation phase use a strip packing of re...
متن کاملTransactional concurrency control for resource constrained applications
Transactions have long been used as a mechanism for ensuring the consistency of databases. Databases, and associated transactional approaches, have always been an active area of research as different application domains and computing architectures have placed ever more elaborate requirements on shared data access. As transactions typically provide consistency at the expense of timeliness (abort...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Network and Computer Applications
سال: 2018
ISSN: 1084-8045
DOI: 10.1016/j.jnca.2018.06.001