Virtualization Security: Analysis and Open Challenges
نویسندگان
چکیده
منابع مشابه
Security challenges with network functions virtualization
The advent of network functions virtualization (NFV) has revolutionized numerous network-based applications due to its several benefits such as flexibility, manageability, scalability, and security. By the software-based virtualization of network functions on a single infrastructure, NFV provides users with a framework that dynamically provisions various network services in a flexible manner. H...
متن کاملVirtualization Security
The recent form of change in working on resources and platform introduced the term virtualization. Virtualization comes with its own merits and challenges. As it hides physical characteristics of the resources and the concept of encapsulation comes into picture. Hypervisor based architecture requires fewer hardware resources and can communicate more efficiently. All major players have introduce...
متن کاملVirtualization and their Security Threats
Few issues in the IT arena are regarded with more interest and passion than virtualization. Virtualization refers to technologies designed to provide a layer of abstraction between computer hardware systems and the software running on them. Here, we are discussing the key concepts of virtualization if you want to implement the virtualization within your environment. Many different vendors have ...
متن کاملVirtualization and their security threats
Few issues in the IT arena are regarded with more interest and passion than virtualization. Virtualization refers to technologies designed to provide a layer of abstraction between computer hardware systems and the software running on them. Here, we are discussing the key concepts of virtualization if you want to implement the virtualization within your environment. Many different vendors have ...
متن کاملVirtualization and Security: a Perspective
Extensive attention has been given to the topic of virtualization. Every aspect of IT has been affected by some form of virtualization. It also has another side – that of the virtual enterprise. We constructed and discussed a map of the facets of virtualization. We created a second diagram of the IT infrastructure containing three parts: computer hardware and software; the mobile worker activit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Hybrid Information Technology
سال: 2015
ISSN: 1738-9968
DOI: 10.14257/ijhit.2015.8.2.22