Hierarchical secure virtualization model for cloud.
Cloud services are providing on-demand resources via virtualization technologies. This will make cloud computing a potential target for cyber attacks. Most proposed security models for virtualization are working above virtualization on host OS. Almost all proposed cloud security models suffers from...
| Main Authors: | Manavi, Sina, Mohammadalian, Sadra, Udzir, Nur Izura, Abdullah, Azizol |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English English |
| Published: |
2012
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/27402/ http://psasir.upm.edu.my/id/eprint/27402/1/ID%2027402.pdf |
Similar Items
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
Digital forensics investigation framework for Raspberry Pi
by: Manavi, Sina
Published: (2015)
by: Manavi, Sina
Published: (2015)
A cloud-based intrusion detection service framework.
by: Yassin, Warusia, et al.
Published: (2012)
by: Yassin, Warusia, et al.
Published: (2012)
Implementation of secure email server in cloud environment
by: Madi, Nadim K. M., et al.
Published: (2012)
by: Madi, Nadim K. M., et al.
Published: (2012)
HTS : a hierarchical method for load balancing in autonomous networks.
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2008)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2008)
A hierarchical self-healing SLA for cloud computing
by: Mosallanejad, Ahmad, et al.
Published: (2014)
by: Mosallanejad, Ahmad, et al.
Published: (2014)
A hierarchical self-X SLA for cloud computing
by: Mosallanejad, Ahmad, et al.
Published: (2014)
by: Mosallanejad, Ahmad, et al.
Published: (2014)
Balanced hierarchical method of collision detection in
virtual environment
by: Sulaiman, Hamzah Asyrani, et al.
Published: (2011)
by: Sulaiman, Hamzah Asyrani, et al.
Published: (2011)
A review of cloud security based on cryptographic mechanisms
by: Abd, Sura Khalil, et al.
Published: (2014)
by: Abd, Sura Khalil, et al.
Published: (2014)
The development of cloud modelling and motion analysis for virtual environment
by: Sunar, Mohd. Shahrizal, et al.
Published: (2005)
by: Sunar, Mohd. Shahrizal, et al.
Published: (2005)
The development of cloud modelling and motion analysis for virtual environment
by: Sunar, Mohd. Shahrizal, et al.
Published: (2005)
by: Sunar, Mohd. Shahrizal, et al.
Published: (2005)
Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers
by: Khoshkholghi, Mohammad Ali, et al.
Published: (2017)
by: Khoshkholghi, Mohammad Ali, et al.
Published: (2017)
Towards secure model for SCADA systems
by: Daryabar, Farid, et al.
Published: (2012)
by: Daryabar, Farid, et al.
Published: (2012)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
An empirical study of the characteristics of access control model towards secure KMS in collaborative environment
by: Abu Bakar, Azreena, et al.
Published: (2011)
by: Abu Bakar, Azreena, et al.
Published: (2011)
Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control
by: Jamal, Fara, et al.
Published: (2020)
by: Jamal, Fara, et al.
Published: (2020)
SLA-based trust model for secure cloud computing
by: Alhamad, Mohammed
Published: (2011)
by: Alhamad, Mohammed
Published: (2011)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Dialogue with the Brown Cloud: a virtual conversation
by: Michaloudis, Ioannis, et al.
Published: (2013)
by: Michaloudis, Ioannis, et al.
Published: (2013)
Model of security level classification for data in hybrid cloud computing
by: Shakir, Mohanaad, et al.
Published: (2016)
by: Shakir, Mohanaad, et al.
Published: (2016)
Secure lightweight client for cloud-based E-Health Model
by: Zhang, Xiaowei
Published: (2023)
by: Zhang, Xiaowei
Published: (2023)
Framework architecture on High Data Availability Server Virtualization for Disaster Recovery
by: Kassim, Murizah, et al.
Published: (2018)
by: Kassim, Murizah, et al.
Published: (2018)
Secure hardware resource monitoring, usage optimization and affirmation for database operations in virtualized cloud environment / Tan Chee Heng
by: Tan, Chee Heng
Published: (2014)
by: Tan, Chee Heng
Published: (2014)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
Hierarchical And Fragment Based Virtual Screening Approaches In The Discovery Of Potent Acetylcholinesterase Inhibitor
by: Muhammad, Erma Fatiha
Published: (2022)
by: Muhammad, Erma Fatiha
Published: (2022)
A hierarchically structured and constraint-based data model for intuitive and precise solid modeling in a virtual reality environment
by: Ma, W., et al.
Published: (2004)
by: Ma, W., et al.
Published: (2004)
Cloud computing security threat with quantum key distribution defense model
by: Khalid, Roszelinda, et al.
Published: (2015)
by: Khalid, Roszelinda, et al.
Published: (2015)
File integrity monitor scheduling based on file security level classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2015)
by: Jaber, Aws Naser, et al.
Published: (2015)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
An enhanced secured mobile IPv6 with multicast function and hierarchical design
by: Khatun, Sabira, et al.
Published: (2009)
by: Khatun, Sabira, et al.
Published: (2009)
Towards a dynamic file integrity monitor through a security classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
A survey about impacts of cloud computing on digital forensics
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Aligning cloud computing security with business strategy
by: Mohamed Hassan El-Hoby, Hany, et al.
Published: (2014)
by: Mohamed Hassan El-Hoby, Hany, et al.
Published: (2014)
A Study in Data Security in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Security and accountability for sharing the data stored in the cloud‏
by: Mohammed, Mostafa Abdulghafoor, et al.
Published: (2016)
by: Mohammed, Mostafa Abdulghafoor, et al.
Published: (2016)
Cloud Security in 21st Century: Current Key Issues in Service Models on Cloud Computing and how to overcome them
by: Sharma, Supern
Published: (2011)
by: Sharma, Supern
Published: (2011)
Energy efficient virtual machine provisioning in cloud data centers
by: Akhter, Nasrin, et al.
Published: (2014)
by: Akhter, Nasrin, et al.
Published: (2014)
Similar Items
-
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014) -
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017) -
Digital forensics investigation framework for Raspberry Pi
by: Manavi, Sina
Published: (2015) -
A cloud-based intrusion detection service framework.
by: Yassin, Warusia, et al.
Published: (2012) -
Implementation of secure email server in cloud environment
by: Madi, Nadim K. M., et al.
Published: (2012)