20,976 research outputs found
Trusted Launch of Virtual Machine Instances in Public IaaS Environments
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging
and promising technologies, however their adoption is hampered by data security
concerns. At the same time, Trusted Computing (TC) is experiencing an increasing
interest as a security mechanism for IaaS. In this paper we present a protocol
to ensure the launch of a virtual machine (VM) instance on a trusted remote
compute host. Relying on Trusted Platform Module operations such as binding
and sealing to provide integrity guarantees for clients that require a trusted VM
launch, we have designed a trusted launch protocol for VM instances in public IaaS
environments. We also present a proof-of-concept implementation of the protocol
based on OpenStack, an open-source IaaS platform. The results provide a basis
for the use of TC mechanisms within IaaS platforms and pave the way for a wider
applicability of TC to IaaS security
2007 ILRF Annual Report
Provides an overview of the progress and setbacks for the International Labor Rights Forum’s various campaigns in 2007, with a particular focus on the progress made in the area of child labor
Bringing Transnational Participatory Democracy to Life: Tips for Would-be Organisers of a European Citizens' Initiative
The first section of the Guide discusses the extent of the power that the ECI truly gives to citizens and offers a brief overview of the ECI process. The second section goes through the process step by step and includes some experiences of current ECIs organisers. The third section provides some lessons from pre-ECI Regulation initiatives. The fourth section summarizes the future of the ECI. The Guide ends with a section providing ECI resources
Mount Carmel Area Community Center Strategic Plan
This document outlines various strategic planning areas for the Mount Carmel Area Community Center located in Mount Carmel, Pennsylvania, to consider, including: building repairs, partners, funding, operations, and marketing. The project builds on prior Bucknell University student reports conducted in partnership with the Mount Carmel Area Community Center (MCACC).
This project was completed as a course requirement for MORS 400: Management Consulting at Bucknell University in Spring 2023, taught by Prof. Eric Martin. The project was in partnership with the Mount Carmel Area Community Center
Trusted Launch of Virtual Machine Instances in Public IaaS Environments
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging
and promising technologies, however their adoption is hampered by data security
concerns. At the same time, Trusted Computing (TC) is experiencing an increasing
interest as a security mechanism for IaaS. In this paper we present a protocol
to ensure the launch of a virtual machine (VM) instance on a trusted remote
compute host. Relying on Trusted Platform Module operations such as binding
and sealing to provide integrity guarantees for clients that require a trusted VM
launch, we have designed a trusted launch protocol for VM instances in public IaaS
environments. We also present a proof-of-concept implementation of the protocol
based on OpenStack, an open-source IaaS platform. The results provide a basis
for the use of TC mechanisms within IaaS platforms and pave the way for a wider
applicability of TC to IaaS security
Trusted Launch of Virtual Machine Instances in Public IaaS Environments
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging
and promising technologies, however their adoption is hampered by data security
concerns. At the same time, Trusted Computing (TC) is experiencing an increasing
interest as a security mechanism for IaaS. In this paper we present a protocol
to ensure the launch of a virtual machine (VM) instance on a trusted remote
compute host. Relying on Trusted Platform Module operations such as binding
and sealing to provide integrity guarantees for clients that require a trusted VM
launch, we have designed a trusted launch protocol for VM instances in public IaaS
environments. We also present a proof-of-concept implementation of the protocol
based on OpenStack, an open-source IaaS platform. The results provide a basis
for the use of TC mechanisms within IaaS platforms and pave the way for a wider
applicability of TC to IaaS security
GAIN Certification
abstract: Live music venues have a tremendous impact on their community, both positive and negative. They provide a location for local and touring musicians to showcase their art in a controlled, professional setting, while bringing members of a community together to share an experience and blow off some steam. Inversely, the noise, waste, and influx of people can have detrimental impacts on the surrounding area, and a poorly designed and poorly run event can ruin a customer’s experience. By combining advice from experienced industry professionals with established strategies outlined in existing certifications like ISO, LEED, APEX/ASTM, etc., the GAIN Standard provides a practical roadmap for venues to save money; reduce their impact on their community and the planet; and deliver a better experience to their customers and employees
Trusted Launch of Generic Virtual Machine Images in Public IaaS Environments
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their faster-pased adoption is hampered by data security concerns. In the same time, Trusted Computing (TC) is experiencing a revived interest as a security mechanism for IaaS. We address the lack of an implementable mechanism to ensure the launch of a virtual machine (VM) instance on a trusted remote host. Relying on Trusted Platform Modules operations such as binding and sealing to provide integrity guarantees for clients that require a trusted VM launch, we have designed a trusted launch protocol for generic VM images in public IaaS environments. We also present a proof-of-concept implemen-
tation of the protocol based on OpenStack, an open-source IaaS platform. The results provide a basis for use of TC mechanisms within IaaS platforms and pave the way for a wider applicability of TC to IaaS security
- …