2009-Challenges and opportunities for virtualized security in the clouds
更新时间:2023-08-14 02:48:01 阅读量: IT计算机 文档下载
- 2009查拉推荐度:
- 相关推荐
Keynote Talk
Challenges and Opportunities
for Virtualized Security in the Clouds
Frank Siebenlist
Argonne National Laboratory – University of Chicago
Argonne, IL, USA
franks@mcs.anl.gov
Abstract
The virtualization technologies that underlie the cloud computing infrastructures pose challenges on enforcing security policy when we have a sense of ambiguity concerning the actual physical properties of the resources. On the other hand, the virtual machine managers provide us with better sandboxing, detailed monitoring capabilities and fine-grained access control on the resource usage. As we expect the whole world to virtualize over the next 5-10 years, the presentation will present a forward-looking view on the cloudy road ahead with a focus on the associated security topics.1 Categories & Subject Descriptors: D.4.6 [OPERATING SYSTEMS] Security and Protection; K.6.5 [MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS] Security and Protection; C.2.0 [COMPUTER-COMMUNICATION NETWORKS] General --- Security and protection (e.g., firewalls)
General Terms: Security, Management, Design
Bio
Frank Siebenlist is a Senior Security Architect at the Mathematics and Computer Science Division at Argonne National Laboratory and a Fellow at the Computation Institute of the University of Chicago. Frank has a Ph.D. in Physics from the University of Amsterdam in the Netherlands. He has extensive experience with distributed computing and security. He has worked for major financial institutions (VP at Citibank and Senior Consultant at J.P. Morgan) in Hong Kong and New York. He has also worked for a number of technology companies, including start-ups in Silicon Valley (Chief Architect at DASCOM and Chief Security Architect at Eazel), and at IBM as a Senior Security Architect. He currently works on the security aspects of various DOE/NSF/NIH-funded Grid projects that deal with cancer research, climate modeling, astronomy, elementary particles, etc. Furthermore, Frank authored, influenced and contributed to numerous of security related standards at X/Open, Open Group, IETF, OMG, OGF, and OASIS.
1 This work was supported by the U.S. Dept. of Energy under contract DE-AC02-06CH11357.
Copyright is held by the author/owner(s).
SACMAT’09, June 3–5, 2009, Stresa, Italy. ACM 978-1-60558-537-6/09/06.
1
正在阅读:
2009-Challenges and opportunities for virtualized security in the clouds08-14
中国近现代史纲要-平时作业10-23
室性心律失常03-18
六幺水调家家唱02-19
四种傅里叶变换04-05
因果关系认定03-08
尽职调查清单04-22
三年级数学下册第四单元《年月日》11-24
- 1IBM AS400 Security Procedures
- 2Analysis and Verification Challenges Cyber-Physical Transportation Systems
- 3spring Security 3.1的配置2
- 4Exam Results- CCNAS Chapter 1- CCNA Security Implementing Network Security- Version 1.0.0.0
- 5Growth opportunities for financial services in China_原文
- 6Spring Security3配置笔记
- 7On the security of a certificateless public-key encryption.
- 8Common Criteria for Information Technology Security Evaluation ....pdf
- 9Future MmSubmm Instrumentation and Science Opportunities Example of Deuterated Molecules
- 10LOAN AND SECURITY AGREEMENT 贷款担保协议目录
- 供应商绩效评价考核程序
- 美国加州水资源开发管理历史与现状的启示
- 供应商主数据最终用户培训教材
- 交通安全科普体验教室施工方案
- 井架安装顺序
- 会员积分制度
- 互联网对美容连锁企业的推动作用
- 互联网发展先驱聚首香港
- 公司文档管理规则
- 机电一体化系统设计基础作业、、、参考答案
- 如何选择BI可视化工具
- 互联网产品经理必备文档技巧
- 居家装修风水的布置_家庭风水布局详解
- 全省基础教育信息化应用与发展情况调查问卷
- 中国石油--计算机网络应用基础第三阶段在线作业
- 【知识管理专题系列之五十八】知识管理中如何实现“场景化协同”
- 网络推广方案
- 中国石油--计算机网络应用基础第二阶段在线作业
- 汽车检测与维修技术专业人才培养方案
- 详解胎儿颈透明层
- opportunities
- virtualized
- Challenges
- security
- clouds
- 2009