[go: up one dir, main page]

Brugnoli et al., 2013 - Google Patents

CREAM Vulnerability Assessment

Brugnoli et al., 2013

View PDF
Document ID
2133566380388795688
Author
Brugnoli M
Frydman M
Carrión J
Heymann E
Publication year

External Links

Snippet

CREAM Vulnerability Assessment Page 1 CREAM Vulnerability Assessment *1 Manuel Brugnoli, Maxime Frydman, Joe Carrión, and Elisa Heymann Universitat Autònoma de Barcelona September, 2013 Introduction The CREAM (Computing Resource Execution And Management) …
Continue reading at research.cs.wisc.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Programme initiating; Programme switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching

Similar Documents

Publication Publication Date Title
US11019068B2 (en) Quorum-based access management
US10664577B2 (en) Authentication using delegated identities
US7509497B2 (en) System and method for providing security to an application
US8024564B2 (en) Automating configuration of software applications
US12413557B2 (en) Trusted execution environment for service mesh
KR20170107967A (en) Identity infrastructure as a service
US8095969B2 (en) Security assertion revocation
US10447682B1 (en) Trust management in an electronic environment
US20080066169A1 (en) Fact Qualifiers in Security Scenarios
US11979411B2 (en) Control of access to computing resources implemented in isolated environments
US20140033272A1 (en) Evaluating a security stack in repsonse to a request to access a service
Falcão et al. Supporting confidential workloads in spire
Maher On software standards and solutions for a trusted Internet of Things
US20100030805A1 (en) Propagating information from a trust chain processing
KR20160060017A (en) Prevention of forgery of web requests to a server
Brugnoli et al. CREAM Vulnerability Assessment
Tourchi Moghaddam et al. A Performant and Secure Single Sign-On System Using Microservices
Ali et al. Scalable, privacy-preserving remote attestation in and through federated identity management frameworks
Huang et al. Agentic AI Identity Security
EP4544440A1 (en) Managing authorisations for local object sharing and integrity protection
Petullo et al. Authentication in ethos
Elgedawy et al. CRESCENT+: a self-protecting framework for reliable composite web service delivery
US10015018B2 (en) Signing key log management
Mustafa et al. Oracle Database Threats
Reza et al. Security trade-off analysis of service-oriented software architecture