Security in a Virtualised Computing

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 14, Issue 3

Abstract

 Do the security challenges posed by virtualisation make it a non-starter for your sensitive business applications? There is much debate about cloud computing, which promises to deliver utility-based virtual computing to the front door of every company. Some are dismissing it as marketing hype – but if it delivers the benefits it claims, it has the potential to transform enterprise computing. So what are the challenges – and what are the opportunities posed by this development?

Authors and Affiliations

E. Geetha Ran

Keywords

Related Articles

 Implementing multicast communication system making use of anexisting data network to offer free TV channels

 Abstract: This paper discusses how a company can implement multicast communication system making use ofits existing data network to offer free TV channels. The advantages and challenges involved in multicastcommuni...

 Evaluating Air Pollution Parameters Using Zigbee (IEEE 802.15.4)

 Air pollution receives one of the prime concerns in India, primarily due to rapid economic growth, industrialization and urbanization with associated increase in energy demands. Lacks of implementation of  e...

 Analysis and Implementation of Efficient Association Rules using K-mean and Neuralgas Algorithm

 Efficient Privacy Preserving association rule mining has emerged as a latest research issue. In this thesis work, existing algorithms, Increase Support of Left Hand Side and Decrease Support of Right Hand Side...

 CPRM: Cooperative Position based Routing scheme for MANETs

 Abstract: A mobile ad hoc network is a wireless communication network, where nodes that are not within direct transmission range of each other will require other nodes to forward data. Routing is difficult in...

 Occlusion detection in video sequences

Abstract: An occlusion is the region between two overlapping objects with disparate motion. Detecting these occluded objects is crucial for many of the video processing. The Occlusion detection is decomposed into two ind...

Download PDF file
  • EP ID EP99048
  • DOI -
  • Views 141
  • Downloads 0

How To Cite

E. Geetha Ran (2013).  Security in a Virtualised Computing. IOSR Journals (IOSR Journal of Computer Engineering), 14(3), 50-54. https://europub.co.uk/articles/-A-99048