A survey of security issues for cloud computing

MA Khan - Journal of network and computer applications, 2016 - Elsevier
High quality computing services with reduced cost and improved performance have made
cloud computing a popular paradigm. Due to its flexible infrastructure, net centric approach …

[HTML][HTML] Classification of network slicing threats based on slicing enablers: A survey

MJK Abood, GH Abdul-Majeed - International Journal of Intelligent …, 2023 - Elsevier
One of the Main expectation of the 5G environment is supporting various services in many
areas such as healthcare, education, energy, streaming, V2X (vehicle to everything) …

Scheduler vulnerabilities and coordinated attacks in cloud computing

F Zhou, M Goel, P Desnoyers… - Journal of Computer …, 2013 - content.iospress.com
In hardware virtualization a hypervisor provides multiple Virtual Machines (VMs) on a single
physical system, each executing a separate operating system instance. The hypervisor …

Virtualization vulnerabilities, security issues, and solutions: a critical study and comparison

D Tank, A Aggarwal, N Chaubey - International Journal of Information …, 2019 - Springer
Virtualization is technological revolution that separates functions from underlying hardware
and allows us to create useful environment from abstract resources. Virtualization …

[PDF][PDF] Extensive Study of Cloud Computing Technologies, Threats and Solutions Prospective.

M Abu-Alhaija, NM Turab… - … Systems Science & …, 2022 - cdn.techscience.cn
Infrastructure as a Service (IaaS) provides logical separation between data, network,
applications and machines from the physical constrains of real machines. IaaS is one of the …

Security aspects of virtualization in cloud computing

M Kazim, R Masood, MA Shibli, AG Abbasi - … Information Systems and …, 2013 - Springer
In Cloud computing, virtualization is the basis of delivering Infrastructure as a Service (IaaS)
that separates data, network, applications and machines from hardware constraints …

Securing the virtual machine images in cloud computing

M Kazim, R Masood, MA Shibli - … of the 6th International Conference on …, 2013 - dl.acm.org
The convergence of virtualization with Cloud computing has brought many benefits to
organizations including ease of deployment, reduced costs and high availability of …

Virtualization security in cloud computing

M Kazim, SY Zhu - Guide to Security Assurance for Cloud Computing, 2015 - Springer
Cloud computing is becoming popular among IT businesses due to its agile, flexible and
cost effective services. Virtualization is a key aspect of cloud computing and a base of …

[图书][B] Improving host-based computer security using secure active monitoring and memory analysis

BD Payne - 2010 - search.proquest.com
Thirty years ago, research in designing operating systems to defeat malicious software was
very popular. The primary technique was to design and implement a small security kernel …

End-to-end security architecture for cloud computing environments

A Wailly - 2014 - theses.fr
Résumé La virtualisation des infrastructures est devenue un des enjeux majeurs dans la
recherche, qui fournissent des consommations d'énergie moindres et des nouvelles …