Security in a Virtualised Computing

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 14, Issue 3

Abstract

 Do the security challenges posed by virtualisation make it a non-starter for your sensitive business applications? There is much debate about cloud computing, which promises to deliver utility-based virtual computing to the front door of every company. Some are dismissing it as marketing hype – but if it delivers the benefits it claims, it has the potential to transform enterprise computing. So what are the challenges – and what are the opportunities posed by this development?

Authors and Affiliations

E. Geetha Ran

Keywords

Related Articles

[u][/u]Effect of Different Mobility Patterns on AODV and OLSR using Different TCP variants

Abstract: In this paper the effect of TCP variant (new reno, tahoe and Sack) is analyzed by using karan’s and nagle theorem by moving nodes at different mobility models on OLSR and AODV protocol. In this nagle theorem is...

 Efficient Techniques for Service Oriented Application

 Abstract: A Service-Based application is composed of different services available in a network, which performing the required functions of the architecture. Web services composition is emerging as a technology for...

Performance of Network Security Issues in Open Source Servers Using iptables

In network system, there are several Open source servers such as DNS, Mail, FTP, Web and SIP. To maintain a secure network environment every server administrator follows an effective method for controlling and operating...

 Review in Cloud Computing Security

 Abstract:The cloud Computing provides an undemanding and Non ineffectual Solution for Daily Computing. The prevalent Problem Associated with Cloud Computing is the Cloud security and the appropriate Implementation...

 Face Recognition System under Varying Lighting Conditions

 Making recognition more reliable under uncontrolled lighting conditions is one of the most important challenges for practical face recognition systems. Other recognition systems don’t nullify most of the lighting...

Download PDF file
  • EP ID EP99048
  • DOI -
  • Views 124
  • Downloads 0

How To Cite

E. Geetha Ran (2013).  Security in a Virtualised Computing. IOSR Journals (IOSR Journal of Computer Engineering), 14(3), 50-54. https://europub.co.uk./articles/-A-99048