dc.contributor.author |
Carroll, M
|
|
dc.contributor.author |
Kotzé, Paula
|
|
dc.contributor.author |
Van der Merwe, A
|
|
dc.date.accessioned |
2011-06-10T06:20:39Z |
|
dc.date.available |
2011-06-10T06:20:39Z |
|
dc.date.issued |
2011-05 |
|
dc.identifier.citation |
Carroll, M, Kotzé, P, and Van der Merwe, A. Secure virtualization: benefits, risks and constraints. 1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, The Netherlands, 7-9 May 2011 |
en_US |
dc.identifier.uri |
http://hdl.handle.net/10204/5054
|
|
dc.description |
1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, The Netherlands, 7-9 May 2011 |
en_US |
dc.description.abstract |
Cloud computing is changing the IT delivery model to provide on-demand self-service access to a shared pool of computing resources (physical and virtual) via broad network access to offer reduced costs, scalability, flexibility, capacity utilization, higher efficiencies and mobility. In many instances cloud computing builds on the capabilities of a virtualized computing infrastructure enabling multi-tenancy, scalability and a highly abstracted cloud model. Even though cloud computing provides compelling benefits and cost-effective options for IT hosting and expansion, security of applications and data remains a number one business objective. It is therefore essential to ensure adequate security not only for cloud computing, but also for the underlying technologies enabling cloud computing. Management should understand and analyse risks in order to safeguard systems and data. The focus of this paper is on mitigation for virtualization security risks as a fundamental step towards secure cloud computing environments. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
SciTePress |
en_US |
dc.relation.ispartofseries |
Workflow;6613 |
|
dc.subject |
Virtualization |
en_US |
dc.subject |
Cloud computing |
en_US |
dc.subject |
Cloud computing benefits |
en_US |
dc.subject |
Virtualization security risks |
en_US |
dc.subject |
Cloud computing risks |
en_US |
dc.subject |
Data safety |
en_US |
dc.title |
Secure virtualization: benefits, risks and constraints |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Carroll, M., Kotzé, P., & Van der Merwe, A. (2011). Secure virtualization: benefits, risks and constraints. SciTePress. http://hdl.handle.net/10204/5054 |
en_ZA |
dc.identifier.chicagocitation |
Carroll, M, Paula Kotzé, and A Van der Merwe. "Secure virtualization: benefits, risks and constraints." (2011): http://hdl.handle.net/10204/5054 |
en_ZA |
dc.identifier.vancouvercitation |
Carroll M, Kotzé P, Van der Merwe A, Secure virtualization: benefits, risks and constraints; SciTePress; 2011. http://hdl.handle.net/10204/5054 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Carroll, M
AU - Kotzé, Paula
AU - Van der Merwe, A
AB - Cloud computing is changing the IT delivery model to provide on-demand self-service access to a shared pool of computing resources (physical and virtual) via broad network access to offer reduced costs, scalability, flexibility, capacity utilization, higher efficiencies and mobility. In many instances cloud computing builds on the capabilities of a virtualized computing infrastructure enabling multi-tenancy, scalability and a highly abstracted cloud model. Even though cloud computing provides compelling benefits and cost-effective options for IT hosting and expansion, security of applications and data remains a number one business objective. It is therefore essential to ensure adequate security not only for cloud computing, but also for the underlying technologies enabling cloud computing. Management should understand and analyse risks in order to safeguard systems and data. The focus of this paper is on mitigation for virtualization security risks as a fundamental step towards secure cloud computing environments.
DA - 2011-05
DB - ResearchSpace
DP - CSIR
KW - Virtualization
KW - Cloud computing
KW - Cloud computing benefits
KW - Virtualization security risks
KW - Cloud computing risks
KW - Data safety
LK - https://researchspace.csir.co.za
PY - 2011
T1 - Secure virtualization: benefits, risks and constraints
TI - Secure virtualization: benefits, risks and constraints
UR - http://hdl.handle.net/10204/5054
ER -
|
en_ZA |