Security in a Virtualised Computing

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 14, Issue 3

Abstract

 Do the security challenges posed by virtualisation make it a non-starter for your sensitive business applications? There is much debate about cloud computing, which promises to deliver utility-based virtual computing to the front door of every company. Some are dismissing it as marketing hype – but if it delivers the benefits it claims, it has the potential to transform enterprise computing. So what are the challenges – and what are the opportunities posed by this development?

Authors and Affiliations

E. Geetha Ran

Keywords

Related Articles

 Effects of Cyber Security on Selected Mobile Phone Payment System in Nairobi Central Business District, Kenya

Abstract: The study aimed at examining effects of cyber security on selected mobile phone payment systems in Nairobi County, Kenya. A purposive complete census was conducted to collect data from the selected mobile phone...

 A Short-Normalized Attack Graph Based Approach for Network Attack Analysis

 Abstract: Attack graphs are the graphs which describe attack scenarios, play important roles in analyzing network threats. These attack graphs are able to reveal such potential threats by evaluating the all possibl...

 Survey of various routing approaches based on quality-of-service (QoS) criteria in MANET

 Abstract: Now a day, Mobile Adhoc Networks (MANET) gained a lot of popularity in the research community. People realized that there is a commercial value in MANETs with the successful solutions of the most basic bu...

 Importance of Mean Shift in Remote Sensing Segmentation

 The segmentation of an image can be considered as a preprocessing step for many of the algorithms such as object detection and identification. Many algorithms exist in the field of remote sensing for segmentati...

An innovative scheme for representation of signed numbers employing ternary logic and method of development of semiconductor optical amplifiers based wavelength encoded optical ternary half adder

Abstract: In binary logic, two different logical states are used to represent signed as well as unsigned numbers. In case of signed numbers one bit, usually the Most Significant Bit is solely devoted to represent the sig...

Download PDF file
  • EP ID EP99048
  • DOI -
  • Views 116
  • Downloads 0

How To Cite

E. Geetha Ran (2013).  Security in a Virtualised Computing. IOSR Journals (IOSR Journal of Computer Engineering), 14(3), 50-54. https://europub.co.uk/articles/-A-99048