Virtualization Security

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 7521 Experts worldwide ranked by ideXlab platform

Quentin Mair - One of the best experts on this subject based on the ideXlab platform.

  • Virtualization Security combining mandatory access control and virtual machine introspection
    IEEE ACM International Conference Utility and Cloud Computing, 2014
    Co-Authors: Thu Yein Win, Huaglory Tianfield, Quentin Mair
    Abstract:

    Virtualization has become a target for attacks in cloud computing environments. Existing approaches to protecting the Virtualization environment against the attacks are limited in protection scope and are with high overheads. This paper proposes a novel Virtualization Security solution which aims to provide comprehensive protection of the Virtualization environment.

  • UCC - Virtualization Security Combining Mandatory Access Control and Virtual Machine Introspection
    2014 IEEE ACM 7th International Conference on Utility and Cloud Computing, 2014
    Co-Authors: Thu Yein Win, Huaglory Tianfield, Quentin Mair
    Abstract:

    Virtualization has become a target for attacks in cloud computing environments. Existing approaches to protecting the Virtualization environment against the attacks are limited in protection scope and are with high overheads. This paper proposes a novel Virtualization Security solution which aims to provide comprehensive protection of the Virtualization environment.

  • SIN - Virtual Machine Introspection
    Proceedings of the 7th International Conference on Security of Information and Networks - SIN '14, 2014
    Co-Authors: Thu Yein Win, Huaglory Tianfield, Quentin Mair, Taimur Al Said, Omer F. Rana
    Abstract:

    Due to exposure to the Internet, virtual machines (VMs) as forms of delivering virtualized infrastructures and resources represent a first point-of-target for Security attackers who want to gain access into the Virtualization environment. In-VM monitoring approach can be compromised in the event of a successful VM compromise. Virtual Machine Introspection (VMI) takes a different approach of monitoring the guest VMs externally. This paper presents a review on VMI focusing on the typical usages of integrating VMI with other Virtualization Security techniques.

Thu Yein Win - One of the best experts on this subject based on the ideXlab platform.

  • Virtualization Security combining mandatory access control and virtual machine introspection
    IEEE ACM International Conference Utility and Cloud Computing, 2014
    Co-Authors: Thu Yein Win, Huaglory Tianfield, Quentin Mair
    Abstract:

    Virtualization has become a target for attacks in cloud computing environments. Existing approaches to protecting the Virtualization environment against the attacks are limited in protection scope and are with high overheads. This paper proposes a novel Virtualization Security solution which aims to provide comprehensive protection of the Virtualization environment.

  • UCC - Virtualization Security Combining Mandatory Access Control and Virtual Machine Introspection
    2014 IEEE ACM 7th International Conference on Utility and Cloud Computing, 2014
    Co-Authors: Thu Yein Win, Huaglory Tianfield, Quentin Mair
    Abstract:

    Virtualization has become a target for attacks in cloud computing environments. Existing approaches to protecting the Virtualization environment against the attacks are limited in protection scope and are with high overheads. This paper proposes a novel Virtualization Security solution which aims to provide comprehensive protection of the Virtualization environment.

  • SIN - Virtual Machine Introspection
    Proceedings of the 7th International Conference on Security of Information and Networks - SIN '14, 2014
    Co-Authors: Thu Yein Win, Huaglory Tianfield, Quentin Mair, Taimur Al Said, Omer F. Rana
    Abstract:

    Due to exposure to the Internet, virtual machines (VMs) as forms of delivering virtualized infrastructures and resources represent a first point-of-target for Security attackers who want to gain access into the Virtualization environment. In-VM monitoring approach can be compromised in the event of a successful VM compromise. Virtual Machine Introspection (VMI) takes a different approach of monitoring the guest VMs externally. This paper presents a review on VMI focusing on the typical usages of integrating VMI with other Virtualization Security techniques.

Huaglory Tianfield - One of the best experts on this subject based on the ideXlab platform.

  • Virtualization Security combining mandatory access control and virtual machine introspection
    IEEE ACM International Conference Utility and Cloud Computing, 2014
    Co-Authors: Thu Yein Win, Huaglory Tianfield, Quentin Mair
    Abstract:

    Virtualization has become a target for attacks in cloud computing environments. Existing approaches to protecting the Virtualization environment against the attacks are limited in protection scope and are with high overheads. This paper proposes a novel Virtualization Security solution which aims to provide comprehensive protection of the Virtualization environment.

  • UCC - Virtualization Security Combining Mandatory Access Control and Virtual Machine Introspection
    2014 IEEE ACM 7th International Conference on Utility and Cloud Computing, 2014
    Co-Authors: Thu Yein Win, Huaglory Tianfield, Quentin Mair
    Abstract:

    Virtualization has become a target for attacks in cloud computing environments. Existing approaches to protecting the Virtualization environment against the attacks are limited in protection scope and are with high overheads. This paper proposes a novel Virtualization Security solution which aims to provide comprehensive protection of the Virtualization environment.

  • SIN - Virtual Machine Introspection
    Proceedings of the 7th International Conference on Security of Information and Networks - SIN '14, 2014
    Co-Authors: Thu Yein Win, Huaglory Tianfield, Quentin Mair, Taimur Al Said, Omer F. Rana
    Abstract:

    Due to exposure to the Internet, virtual machines (VMs) as forms of delivering virtualized infrastructures and resources represent a first point-of-target for Security attackers who want to gain access into the Virtualization environment. In-VM monitoring approach can be compromised in the event of a successful VM compromise. Virtual Machine Introspection (VMI) takes a different approach of monitoring the guest VMs externally. This paper presents a review on VMI focusing on the typical usages of integrating VMI with other Virtualization Security techniques.

Li Rui - One of the best experts on this subject based on the ideXlab platform.

Jianyong Chen - One of the best experts on this subject based on the ideXlab platform.

  • Virtualization Security for cloud computing service
    2011 International Conference on Cloud and Service Computing, 2011
    Co-Authors: Xiaohua Chen, Zhuolin Yang, Jianyong Chen
    Abstract:

    Virtualization is a term that refers to the abstraction of computer resources. The purpose of virtual computing environment is to improve resource utilization by providing a unified integrated operating platform for users and applications based on aggregation of heterogeneous and autonomous resources. More recently, Virtualization at all levels (system storage, and network) became important again as a way to improve system Security, reliability and availability, reduce costs and provide greater flexibility. In this paper, we address the requirements and solutions for the Security of Virtualization in cloud computing environment. Moreover, a Virtualization Security framework is presented which contains two parts: virtual system Security and Virtualization Security management.

  • CDC - Virtualization Security for cloud computing service
    2011 International Conference on Cloud and Service Computing, 2011
    Co-Authors: Shengmei Luo, Zhuolin Yang, Xiaohua Chen, Zhaoji Lin, Jianyong Chen
    Abstract:

    Virtualization is a term that refers to the abstraction of computer resources. The purpose of virtual computing environment is to improve resource utilization by providing a unified integrated operating platform for users and applications based on aggregation of heterogeneous and autonomous resources. More recently, Virtualization at all levels (system storage, and network) became important again as a way to improve system Security, reliability and availability, reduce costs and provide greater flexibility. In this paper, we address the requirements and solutions for the Security of Virtualization in cloud computing environment. Moreover, a Virtualization Security framework is presented which contains two parts: virtual system Security and Virtualization Security management.