Towards Security-Aware Virtual Server Migration Optimization to the Cloud.
Bowu ZhangJinho HwangLiran MaTimothy WoodPublished in: ICAC (2015)
Keyphrases
- cloud computing
- network access
- intrusion detection
- multi tenant
- cloud computing environment
- security issues
- optimization algorithm
- security policies
- virtual reality
- database
- information security
- client server
- virtual environment
- optimization method
- augmented reality
- network security
- authentication protocol
- application level
- access control
- data management
- authentication mechanism
- optimization problems
- data center
- wireless networks
- map reduce