The Experts below are selected from a list of 7521 Experts worldwide ranked by ideXlab platform
Quentin Mair - One of the best experts on this subject based on the ideXlab platform.
-
Virtualization Security combining mandatory access control and virtual machine introspection
IEEE ACM International Conference Utility and Cloud Computing, 2014Co-Authors: Thu Yein Win, Huaglory Tianfield, Quentin MairAbstract:Virtualization has become a target for attacks in cloud computing environments. Existing approaches to protecting the Virtualization environment against the attacks are limited in protection scope and are with high overheads. This paper proposes a novel Virtualization Security solution which aims to provide comprehensive protection of the Virtualization environment.
-
UCC - Virtualization Security Combining Mandatory Access Control and Virtual Machine Introspection
2014 IEEE ACM 7th International Conference on Utility and Cloud Computing, 2014Co-Authors: Thu Yein Win, Huaglory Tianfield, Quentin MairAbstract:Virtualization has become a target for attacks in cloud computing environments. Existing approaches to protecting the Virtualization environment against the attacks are limited in protection scope and are with high overheads. This paper proposes a novel Virtualization Security solution which aims to provide comprehensive protection of the Virtualization environment.
-
SIN - Virtual Machine Introspection
Proceedings of the 7th International Conference on Security of Information and Networks - SIN '14, 2014Co-Authors: Thu Yein Win, Huaglory Tianfield, Quentin Mair, Taimur Al Said, Omer F. RanaAbstract:Due to exposure to the Internet, virtual machines (VMs) as forms of delivering virtualized infrastructures and resources represent a first point-of-target for Security attackers who want to gain access into the Virtualization environment. In-VM monitoring approach can be compromised in the event of a successful VM compromise. Virtual Machine Introspection (VMI) takes a different approach of monitoring the guest VMs externally. This paper presents a review on VMI focusing on the typical usages of integrating VMI with other Virtualization Security techniques.
Thu Yein Win - One of the best experts on this subject based on the ideXlab platform.
-
Virtualization Security combining mandatory access control and virtual machine introspection
IEEE ACM International Conference Utility and Cloud Computing, 2014Co-Authors: Thu Yein Win, Huaglory Tianfield, Quentin MairAbstract:Virtualization has become a target for attacks in cloud computing environments. Existing approaches to protecting the Virtualization environment against the attacks are limited in protection scope and are with high overheads. This paper proposes a novel Virtualization Security solution which aims to provide comprehensive protection of the Virtualization environment.
-
UCC - Virtualization Security Combining Mandatory Access Control and Virtual Machine Introspection
2014 IEEE ACM 7th International Conference on Utility and Cloud Computing, 2014Co-Authors: Thu Yein Win, Huaglory Tianfield, Quentin MairAbstract:Virtualization has become a target for attacks in cloud computing environments. Existing approaches to protecting the Virtualization environment against the attacks are limited in protection scope and are with high overheads. This paper proposes a novel Virtualization Security solution which aims to provide comprehensive protection of the Virtualization environment.
-
SIN - Virtual Machine Introspection
Proceedings of the 7th International Conference on Security of Information and Networks - SIN '14, 2014Co-Authors: Thu Yein Win, Huaglory Tianfield, Quentin Mair, Taimur Al Said, Omer F. RanaAbstract:Due to exposure to the Internet, virtual machines (VMs) as forms of delivering virtualized infrastructures and resources represent a first point-of-target for Security attackers who want to gain access into the Virtualization environment. In-VM monitoring approach can be compromised in the event of a successful VM compromise. Virtual Machine Introspection (VMI) takes a different approach of monitoring the guest VMs externally. This paper presents a review on VMI focusing on the typical usages of integrating VMI with other Virtualization Security techniques.
Huaglory Tianfield - One of the best experts on this subject based on the ideXlab platform.
-
Virtualization Security combining mandatory access control and virtual machine introspection
IEEE ACM International Conference Utility and Cloud Computing, 2014Co-Authors: Thu Yein Win, Huaglory Tianfield, Quentin MairAbstract:Virtualization has become a target for attacks in cloud computing environments. Existing approaches to protecting the Virtualization environment against the attacks are limited in protection scope and are with high overheads. This paper proposes a novel Virtualization Security solution which aims to provide comprehensive protection of the Virtualization environment.
-
UCC - Virtualization Security Combining Mandatory Access Control and Virtual Machine Introspection
2014 IEEE ACM 7th International Conference on Utility and Cloud Computing, 2014Co-Authors: Thu Yein Win, Huaglory Tianfield, Quentin MairAbstract:Virtualization has become a target for attacks in cloud computing environments. Existing approaches to protecting the Virtualization environment against the attacks are limited in protection scope and are with high overheads. This paper proposes a novel Virtualization Security solution which aims to provide comprehensive protection of the Virtualization environment.
-
SIN - Virtual Machine Introspection
Proceedings of the 7th International Conference on Security of Information and Networks - SIN '14, 2014Co-Authors: Thu Yein Win, Huaglory Tianfield, Quentin Mair, Taimur Al Said, Omer F. RanaAbstract:Due to exposure to the Internet, virtual machines (VMs) as forms of delivering virtualized infrastructures and resources represent a first point-of-target for Security attackers who want to gain access into the Virtualization environment. In-VM monitoring approach can be compromised in the event of a successful VM compromise. Virtual Machine Introspection (VMI) takes a different approach of monitoring the guest VMs externally. This paper presents a review on VMI focusing on the typical usages of integrating VMI with other Virtualization Security techniques.
Li Rui - One of the best experts on this subject based on the ideXlab platform.
-
Study of Storage Virtualization Security Technology
Computers & Security, 2011Co-Authors: Li RuiAbstract:This isolation from the resources and access control,data encryption、intrusion detection、secure storage of equipment and data from the deletion of the storage Virtualization to describe the application of Security mechanisms.
Jianyong Chen - One of the best experts on this subject based on the ideXlab platform.
-
Virtualization Security for cloud computing service
2011 International Conference on Cloud and Service Computing, 2011Co-Authors: Xiaohua Chen, Zhuolin Yang, Jianyong ChenAbstract:Virtualization is a term that refers to the abstraction of computer resources. The purpose of virtual computing environment is to improve resource utilization by providing a unified integrated operating platform for users and applications based on aggregation of heterogeneous and autonomous resources. More recently, Virtualization at all levels (system storage, and network) became important again as a way to improve system Security, reliability and availability, reduce costs and provide greater flexibility. In this paper, we address the requirements and solutions for the Security of Virtualization in cloud computing environment. Moreover, a Virtualization Security framework is presented which contains two parts: virtual system Security and Virtualization Security management.
-
CDC - Virtualization Security for cloud computing service
2011 International Conference on Cloud and Service Computing, 2011Co-Authors: Shengmei Luo, Zhuolin Yang, Xiaohua Chen, Zhaoji Lin, Jianyong ChenAbstract:Virtualization is a term that refers to the abstraction of computer resources. The purpose of virtual computing environment is to improve resource utilization by providing a unified integrated operating platform for users and applications based on aggregation of heterogeneous and autonomous resources. More recently, Virtualization at all levels (system storage, and network) became important again as a way to improve system Security, reliability and availability, reduce costs and provide greater flexibility. In this paper, we address the requirements and solutions for the Security of Virtualization in cloud computing environment. Moreover, a Virtualization Security framework is presented which contains two parts: virtual system Security and Virtualization Security management.