20,976 research outputs found

    Trusted Launch of Virtual Machine Instances in Public IaaS Environments

    Get PDF
    Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their adoption is hampered by data security concerns. At the same time, Trusted Computing (TC) is experiencing an increasing interest as a security mechanism for IaaS. In this paper we present a protocol to ensure the launch of a virtual machine (VM) instance on a trusted remote compute host. Relying on Trusted Platform Module operations such as binding and sealing to provide integrity guarantees for clients that require a trusted VM launch, we have designed a trusted launch protocol for VM instances in public IaaS environments. We also present a proof-of-concept implementation of the protocol based on OpenStack, an open-source IaaS platform. The results provide a basis for the use of TC mechanisms within IaaS platforms and pave the way for a wider applicability of TC to IaaS security

    2007 ILRF Annual Report

    Get PDF
    Provides an overview of the progress and setbacks for the International Labor Rights Forum’s various campaigns in 2007, with a particular focus on the progress made in the area of child labor

    Bringing Transnational Participatory Democracy to Life: Tips for Would-be Organisers of a European Citizens' Initiative

    Get PDF
    The first section of the Guide discusses the extent of the power that the ECI truly gives to citizens and offers a brief overview of the ECI process. The second section goes through the process step by step and includes some experiences of current ECIs organisers. The third section provides some lessons from pre-ECI Regulation initiatives. The fourth section summarizes the future of the ECI. The Guide ends with a section providing ECI resources

    Mount Carmel Area Community Center Strategic Plan

    Get PDF
    This document outlines various strategic planning areas for the Mount Carmel Area Community Center located in Mount Carmel, Pennsylvania, to consider, including: building repairs, partners, funding, operations, and marketing. The project builds on prior Bucknell University student reports conducted in partnership with the Mount Carmel Area Community Center (MCACC). This project was completed as a course requirement for MORS 400: Management Consulting at Bucknell University in Spring 2023, taught by Prof. Eric Martin. The project was in partnership with the Mount Carmel Area Community Center

    Trusted Launch of Virtual Machine Instances in Public IaaS Environments

    Get PDF
    Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their adoption is hampered by data security concerns. At the same time, Trusted Computing (TC) is experiencing an increasing interest as a security mechanism for IaaS. In this paper we present a protocol to ensure the launch of a virtual machine (VM) instance on a trusted remote compute host. Relying on Trusted Platform Module operations such as binding and sealing to provide integrity guarantees for clients that require a trusted VM launch, we have designed a trusted launch protocol for VM instances in public IaaS environments. We also present a proof-of-concept implementation of the protocol based on OpenStack, an open-source IaaS platform. The results provide a basis for the use of TC mechanisms within IaaS platforms and pave the way for a wider applicability of TC to IaaS security

    Trusted Launch of Virtual Machine Instances in Public IaaS Environments

    Get PDF
    Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their adoption is hampered by data security concerns. At the same time, Trusted Computing (TC) is experiencing an increasing interest as a security mechanism for IaaS. In this paper we present a protocol to ensure the launch of a virtual machine (VM) instance on a trusted remote compute host. Relying on Trusted Platform Module operations such as binding and sealing to provide integrity guarantees for clients that require a trusted VM launch, we have designed a trusted launch protocol for VM instances in public IaaS environments. We also present a proof-of-concept implementation of the protocol based on OpenStack, an open-source IaaS platform. The results provide a basis for the use of TC mechanisms within IaaS platforms and pave the way for a wider applicability of TC to IaaS security

    GAIN Certification

    Get PDF
    abstract: Live music venues have a tremendous impact on their community, both positive and negative. They provide a location for local and touring musicians to showcase their art in a controlled, professional setting, while bringing members of a community together to share an experience and blow off some steam. Inversely, the noise, waste, and influx of people can have detrimental impacts on the surrounding area, and a poorly designed and poorly run event can ruin a customer’s experience. By combining advice from experienced industry professionals with established strategies outlined in existing certifications like ISO, LEED, APEX/ASTM, etc., the GAIN Standard provides a practical roadmap for venues to save money; reduce their impact on their community and the planet; and deliver a better experience to their customers and employees

    Breaking Down the Fixing Up Industry

    Get PDF

    Trusted Launch of Generic Virtual Machine Images in Public IaaS Environments

    Get PDF
    Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their faster-pased adoption is hampered by data security concerns. In the same time, Trusted Computing (TC) is experiencing a revived interest as a security mechanism for IaaS. We address the lack of an implementable mechanism to ensure the launch of a virtual machine (VM) instance on a trusted remote host. Relying on Trusted Platform Modules operations such as binding and sealing to provide integrity guarantees for clients that require a trusted VM launch, we have designed a trusted launch protocol for generic VM images in public IaaS environments. We also present a proof-of-concept implemen- tation of the protocol based on OpenStack, an open-source IaaS platform. The results provide a basis for use of TC mechanisms within IaaS platforms and pave the way for a wider applicability of TC to IaaS security
    • …
    corecore