LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Yuusuf, Hamse; VIDALIS, Stilianos (2012)
Languages: English
Types: Unknown
Subjects: G400
The success of cloud computing would not be possible without the advances in virtualization. The basic concept is to have one resource pretend to be another. Its implementation is applicable to many areas of computing. Virtualization allows a computer to become several different computers, or one software package to emulate another.\ud Although virtualization technology has been around for many years, it is only now beginning to be fully deployed. One of the reasons for this is the increase in processing power and advances in hardware technology. As the benefits of virtualization are realised, we can observe the benefits to a wide range of users, from IT professionals, to large businesses and government organizations.\ud Firstly this paper aims to discuss the key technology behind virtualisation, secondly analyse current threats and vulnerabilities, and finally propose corresponding countermeasures of Virtualisation threats and vulnerabilities, in order to facilitate the implementation of Virtualization Technologies for organizations.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] Ronald L. Krutz and Russell Dean Vines, Cloud Security, A comprehensive guide to Secure Computing [3] Gary Anthesm, Security in the Cloud (2010) Communication of the ACM Vol. 53 No.11
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article