Xen and the art of virtualization
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Seamless live migration of virtual machines over the MAN/WAN
Future Generation Computer Systems - IGrid 2005: The global lambda integrated facility
A comparison of software and hardware techniques for x86 virtualization
Proceedings of the 12th international conference on Architectural support for programming languages and operating systems
Proceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications
Security analysis of public cloud computing
International Journal of Communication Networks and Distributed Systems
Toward Understanding the Challenges and Countermeasures in Computer Anti-Forensics
International Journal of Cloud Applications and Computing
From Service Oriented to Cloud Powered Manufacturing Systems
UCC '13 Proceedings of the 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing
Hi-index | 0.00 |
Over the past few years, researchers have been striving for a Utility Computing Model. Cloud computing allows delivering information technology on demand. Cloud Computing service providers provides resources by means of virtualization. Applying these techniques however goes along with handling over ultimate control of data to a third party. This paper discusses several issues in virtualization security, summery of various solutions, risk prevention in VMM (virtual machine monitor). Here an attempt is made to perform the analysis of various issues pertaining to virtualization and security.