2017 International Conference on Computer Science and Engineering (UBMK) 2017
DOI: 10.1109/ubmk.2017.8093379
|View full text |Cite
|
Sign up to set email alerts
|

Virtualization and security: Examination of a virtualization platform structure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…There are mainly 2 types of hypervisors: (1) Type-1 hypervisor is directly implemented on the hardware, so it reaches better performance. (2) Type-2 hypervisor will be hosted by a guest operating system so, it delivers a low level of performance compared to Type (1) hypervisor [3]. Type-1 hypervisor is an example of kernel class, it is also called bare-metal hypervisor because it works directly on the hardware on which its operating system is mounted.…”
Section: Virtual Mail Servermentioning
confidence: 99%
See 2 more Smart Citations
“…There are mainly 2 types of hypervisors: (1) Type-1 hypervisor is directly implemented on the hardware, so it reaches better performance. (2) Type-2 hypervisor will be hosted by a guest operating system so, it delivers a low level of performance compared to Type (1) hypervisor [3]. Type-1 hypervisor is an example of kernel class, it is also called bare-metal hypervisor because it works directly on the hardware on which its operating system is mounted.…”
Section: Virtual Mail Servermentioning
confidence: 99%
“…Different type-2 hypervisor software's are VMware Workstation, Oracle VirtualBox, QEMU KVM, Microsoft's virtual CPU, etc. [3].…”
Section: Virtual Mail Servermentioning
confidence: 99%
See 1 more Smart Citation
“…Researchers Arslan and Özbilgin (2017) defined virtualization at the Institute of Electrical and Electronics Engineers' 2017 International Conference on Computer Science and Engineering as "the creation of components, such as hardware platform, operating system, storage, processing power, memory, or network resource, in virtual environments," and highlighted that, "The applications of virtualization are spreading rapidly, and the critical systems are working on virtualization infrastructures." The move towards virtualized systems offers several key engineering and testing advantages that are aligned with the Chief of Naval Operations vision for the future Navy such as reduced space requirements, decoupling software from hardware, greater flexibility and adaptability, and increased speed and frequency of software updates.…”
Section: Aegis Virtualmentioning
confidence: 99%
“…Through the MEC processing at the network edge, the data transmission consumes less energy and produces lower latency [18]- [20]. So far, researchers have employed some key technologies of MEC, including Software Defined Network (SDN) [21], Virtualization [22], and Cloud technology [23], in typical applications, such as Intelligent video acceleration, Computing intensive applications, Internet of vehicles and Internet of things (IoT) [24]- [27]. Besides the limited computating ability, some mobile device also suffer from insufficient energy, such as Unmanned Aerial Vehicle (UAV) and IoT [28], [29].…”
Section: Introductionmentioning
confidence: 99%