A taxonomy of virtualization security issues in cloud computing environments

NM Almutairy, KHA Al-Shqeerat… - Indian Journal of Science …, 2019 - ssoar.info
Objectives: To identify the main challenges and security issues of virtualization in cloud
computing environments. It reviews the alleviation techniques for improving the security of …

Assessment of hypervisor vulnerabilities

A Thongthua, S Ngamsuriyaroj - 2016 International conference …, 2016 - ieeexplore.ieee.org
Hypervisors are the main components for managing virtual machines on cloud computing
systems. Thus, the security of hypervisors is very crucial as the whole system could be …

A survey on security challenges of virtualization technology in cloud computing

NM Almutairy, KHA Al-Shqeerat - International Journal of …, 2019 - papers.ssrn.com
Virtualization has become a widely and attractive employed technology in cloud computing
environments. Sharing of a single physical machine between multiple isolated virtual …

Biometric encryption to enhance confidentiality in Cloud computing

MN Omar, M Salleh, M Bakhtiari - … International symposium on …, 2014 - ieeexplore.ieee.org
Virtualization technology is the base technology used in Cloud computing. Therefore,
virtualization enables Cloud computing to provide hardware and software services to the …

Incident duration model on urban freeways based on classification and regression tree

Z Xiaoqiang, L Ruimin, Y Xinxin - 2009 Second International …, 2009 - ieeexplore.ieee.org
Effective incident management requires accurate prediction of incident duration. In this
paper, classification and regression tree (CART) is employed to model the incident duration …

Virtualization security: analysis and open challenges

M Arif, H Shakeel - International Journal of Hybrid Information …, 2015 - earticle.net
Virtualization is a term that refers to the abstraction of computer resources. Virtualization has
many applications within any organization. This makes possible virtual storage network and …

[PDF][PDF] Analysis of Protection Options for Virtualized Infrastructures in Infrastructure as a Service Cloud

R Chandramouli - Proceedings of the Fifth International Conference …, 2014 - academia.edu
Infrastructure as a Service (IaaS) is one of the three main cloud service types where the
cloud consumer consumes a great variety of resources, such as computing (Virtual …

A Steady‐State Framework for Assessing Security Mechanisms in a Cloud‐of‐Things Architecture

TT Brooks, LM c Knight - Cyber‐Assurance for the Internet of …, 2016 - Wiley Online Library
The ability to process large amounts of data with the integration of the Internet of Things (IoT)
and cloud computing environments means organizations can trade sophisticated security …

Security Incident Tracking in Virtualized Linux Environment

M Tu, S Xue - 2014 ASEE Annual Conference & Exposition, 2014 - peer.asee.org
While virtualization has been a key technology that can be leveraged to achievebusiness
benefits, virtualized environment provides a heaven for malicious and criminal activities. We …

[引用][C] An Analysis of Innovative Cloud Model as Bridging the Gap between Physical and Virtualized Business Environments: The Customer Perspective

A Majeed, R Bhana, M Sharma, R Goode, N Bolia - International Journal of …, 2016