ResearchSpace

Secure virtualization: benefits, risks and constraints

Show simple item record

dc.contributor.author Carroll, M
dc.contributor.author Kotzé, Paula
dc.contributor.author Van der Merwe, A
dc.date.accessioned 2011-06-10T06:20:39Z
dc.date.available 2011-06-10T06:20:39Z
dc.date.issued 2011-05
dc.identifier.citation Carroll, M, Kotzé, P, and Van der Merwe, A. Secure virtualization: benefits, risks and constraints. 1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, The Netherlands, 7-9 May 2011 en_US
dc.identifier.uri http://hdl.handle.net/10204/5054
dc.description 1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, The Netherlands, 7-9 May 2011 en_US
dc.description.abstract Cloud computing is changing the IT delivery model to provide on-demand self-service access to a shared pool of computing resources (physical and virtual) via broad network access to offer reduced costs, scalability, flexibility, capacity utilization, higher efficiencies and mobility. In many instances cloud computing builds on the capabilities of a virtualized computing infrastructure enabling multi-tenancy, scalability and a highly abstracted cloud model. Even though cloud computing provides compelling benefits and cost-effective options for IT hosting and expansion, security of applications and data remains a number one business objective. It is therefore essential to ensure adequate security not only for cloud computing, but also for the underlying technologies enabling cloud computing. Management should understand and analyse risks in order to safeguard systems and data. The focus of this paper is on mitigation for virtualization security risks as a fundamental step towards secure cloud computing environments. en_US
dc.language.iso en en_US
dc.publisher SciTePress en_US
dc.relation.ispartofseries Workflow;6613
dc.subject Virtualization en_US
dc.subject Cloud computing en_US
dc.subject Cloud computing benefits en_US
dc.subject Virtualization security risks en_US
dc.subject Cloud computing risks en_US
dc.subject Data safety en_US
dc.title Secure virtualization: benefits, risks and constraints en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Carroll, M., Kotzé, P., & Van der Merwe, A. (2011). Secure virtualization: benefits, risks and constraints. SciTePress. http://hdl.handle.net/10204/5054 en_ZA
dc.identifier.chicagocitation Carroll, M, Paula Kotzé, and A Van der Merwe. "Secure virtualization: benefits, risks and constraints." (2011): http://hdl.handle.net/10204/5054 en_ZA
dc.identifier.vancouvercitation Carroll M, Kotzé P, Van der Merwe A, Secure virtualization: benefits, risks and constraints; SciTePress; 2011. http://hdl.handle.net/10204/5054 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Carroll, M AU - Kotzé, Paula AU - Van der Merwe, A AB - Cloud computing is changing the IT delivery model to provide on-demand self-service access to a shared pool of computing resources (physical and virtual) via broad network access to offer reduced costs, scalability, flexibility, capacity utilization, higher efficiencies and mobility. In many instances cloud computing builds on the capabilities of a virtualized computing infrastructure enabling multi-tenancy, scalability and a highly abstracted cloud model. Even though cloud computing provides compelling benefits and cost-effective options for IT hosting and expansion, security of applications and data remains a number one business objective. It is therefore essential to ensure adequate security not only for cloud computing, but also for the underlying technologies enabling cloud computing. Management should understand and analyse risks in order to safeguard systems and data. The focus of this paper is on mitigation for virtualization security risks as a fundamental step towards secure cloud computing environments. DA - 2011-05 DB - ResearchSpace DP - CSIR KW - Virtualization KW - Cloud computing KW - Cloud computing benefits KW - Virtualization security risks KW - Cloud computing risks KW - Data safety LK - https://researchspace.csir.co.za PY - 2011 T1 - Secure virtualization: benefits, risks and constraints TI - Secure virtualization: benefits, risks and constraints UR - http://hdl.handle.net/10204/5054 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record