This article, from Intel, discusses significant new threats to host agents, outlines a generic architecture for malware detection, based on enhanced cloud computing, describes how Intel platform technologies can be used to enhance computing solutions, and ends with a threat analysis of the approaches presented. Malware that masks its presence from traditional security agents is the article focus.
The authors, from Intel, offer a three pronged approach to providing secure transmission of high volume HTML traffic: new CPU instructions to accelerate cryptographic operations; a novel implementation of the RSA algorithm to accelerate public key encryption; and using SMT to balance web server and cryptographic operations. Their approach, they claim, leads to significant cost savings.
Botnets are the latest scourge to hit the Internet and this article defines a botnet (a collection of distributed computers or systems that has been taken over by rogue software), examines the botnet life cycle, and presents several promising anti-botnet defense strategies including canary detectors, white lists, and malware traces.
This article explores the structural economic changes brought up by service orientation and how the concept of services and the reuse of services promise long lasting relief from the cost treadmill.
This article discusses the combination of three ideas, virtualization, service-orientation, and grid computing into a single concept and computing platform concept.
The confluence of three technologies, (virtualization, service orientation, and grid computing), is explored to create a foundation for re-examining both technical and business system design issues. 2