期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Root-Of-Trust for Continuous Integration and Continuous Deployment Pipeline in Cloud Computing
1
作者 Abdul Saboor Mohd Fadzil Hassan +4 位作者 Rehan Akbar Erwin Susanto Syed Nasir Mehmood Shah Muhammad Aadil Siddiqui Saeed Ahmed Magsi 《Computers, Materials & Continua》 SCIE EI 2022年第11期2223-2239,共17页
Cloud computing has gained significant use over the last decade due to its several benefits,including cost savings associated with setup,deployments,delivery,physical resource sharing across virtual machines,and avail... Cloud computing has gained significant use over the last decade due to its several benefits,including cost savings associated with setup,deployments,delivery,physical resource sharing across virtual machines,and availability of on-demand cloud services.However,in addition to usual threats in almost every computing environment,cloud computing has also introduced a set of new threats as consumers share physical resources due to the physical co-location paradigm.Furthermore,since there are a growing number of attacks directed at cloud environments(including dictionary attacks,replay code attacks,denial of service attacks,rootkit attacks,code injection attacks,etc.),customers require additional assurances before adopting cloud services.Moreover,the continuous integration and continuous deployment of the code fragments have made cloud services more prone to security breaches.In this study,the model based on the root of trust for continuous integration and continuous deployment is proposed,instead of only relying on a single signon authentication method that typically uses only id and password.The underlying study opted hardware security module by utilizing the Trusted Platform Module(TPM),which is commonly available as a cryptoprocessor on the motherboards of the personal computers and data center servers.The preliminary proof of concept demonstrated that the TPM features can be utilized through RESTful services to establish the root of trust for continuous integration and continuous deployment pipeline and can additionally be integrated as a secure microservice feature in the cloud computing environment. 展开更多
关键词 Root of Trust(RoT) Trusted Platform Module(TPM) cryptoprocessor microservices Hardware Security Modules(HSM) DevOps
在线阅读 下载PDF
基于可分负载理论的多核密码处理器调度研究
2
作者 郎俊豪 李伟 +1 位作者 陈韬 南龙梅 《计算机工程》 CAS CSCD 北大核心 2023年第10期255-263,共9页
针对多核密码处理器高能效负载调度问题,基于可分负载理论提出多轮与单轮混合负载调度机制,在不增加功耗前提下缩短密码任务完成时间,提升处理器能效。利用可分负载理论分析方法重点划分计算、负载传输时间,建立单轮调度、多轮与单轮混... 针对多核密码处理器高能效负载调度问题,基于可分负载理论提出多轮与单轮混合负载调度机制,在不增加功耗前提下缩短密码任务完成时间,提升处理器能效。利用可分负载理论分析方法重点划分计算、负载传输时间,建立单轮调度、多轮与单轮混合调度方式,得到数学解析解以指导负载调度高能效设计,同时考虑计算通信占比、结果输出等因素以精确模型。分析模型并设计负载调度机制,在多核密码处理器芯片上实现并验证。MATLAB仿真结果表明,混合调度方式具有更好的性能表现,密码任务传输与计算时间比越大,负载完成时间的下限值越大,当处理器核数、调度轮数取中间值时,达到最优的负载完成时间和能效值,当结果输出时间小于任务传输时间时,影响较小。芯片实测结果表明,对于不同密码算法,提出的多轮与单轮混合调度方式能缩短10.1%~48.2%的负载任务完成时间,相应的多核密码处理器能效值提升9.8%~48.1%。 展开更多
关键词 密码处理器 多核处理器 可分负载理论 负载调度 高能效
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部