Brugnoli et al., 2013 - Google Patents
CREAM Vulnerability AssessmentBrugnoli et al., 2013
View PDF- Document ID
- 2133566380388795688
- Author
- Brugnoli M
- Frydman M
- Carrión J
- Heymann E
- Publication year
External Links
Snippet
CREAM Vulnerability Assessment Page 1 CREAM Vulnerability Assessment *1 Manuel Brugnoli,
Maxime Frydman, Joe Carrión, and Elisa Heymann Universitat Autònoma de Barcelona
September, 2013 Introduction The CREAM (Computing Resource Execution And Management) …
- 239000006071 cream 0 title description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5005—Allocation of resources, e.g. of the central processing unit [CPU] to service a request
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Programme initiating; Programme switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11019068B2 (en) | Quorum-based access management | |
US10664577B2 (en) | Authentication using delegated identities | |
US7509497B2 (en) | System and method for providing security to an application | |
US8024564B2 (en) | Automating configuration of software applications | |
US12413557B2 (en) | Trusted execution environment for service mesh | |
KR20170107967A (en) | Identity infrastructure as a service | |
US8095969B2 (en) | Security assertion revocation | |
US10447682B1 (en) | Trust management in an electronic environment | |
US20080066169A1 (en) | Fact Qualifiers in Security Scenarios | |
US11979411B2 (en) | Control of access to computing resources implemented in isolated environments | |
US20140033272A1 (en) | Evaluating a security stack in repsonse to a request to access a service | |
Falcão et al. | Supporting confidential workloads in spire | |
Maher | On software standards and solutions for a trusted Internet of Things | |
US20100030805A1 (en) | Propagating information from a trust chain processing | |
KR20160060017A (en) | Prevention of forgery of web requests to a server | |
Brugnoli et al. | CREAM Vulnerability Assessment | |
Tourchi Moghaddam et al. | A Performant and Secure Single Sign-On System Using Microservices | |
Ali et al. | Scalable, privacy-preserving remote attestation in and through federated identity management frameworks | |
Huang et al. | Agentic AI Identity Security | |
EP4544440A1 (en) | Managing authorisations for local object sharing and integrity protection | |
Petullo et al. | Authentication in ethos | |
Elgedawy et al. | CRESCENT+: a self-protecting framework for reliable composite web service delivery | |
US10015018B2 (en) | Signing key log management | |
Mustafa et al. | Oracle Database Threats | |
Reza et al. | Security trade-off analysis of service-oriented software architecture |