dc.contributor.author |
Sharma, K |
|
dc.contributor.author |
Carnage, C |
|
dc.contributor.editor |
Rodrigo, R |
|
dc.date.accessioned |
2022-12-22T06:25:32Z |
|
dc.date.available |
2022-12-22T06:25:32Z |
|
dc.date.issued |
2013-02 |
|
dc.identifier.citation |
***** |
en_US |
dc.identifier.uri |
http://dl.lib.uom.lk/handle/123/19863 |
|
dc.description.abstract |
Enterprises continually seek innovative approaches to reduce operational computing costs while extracting the
maximum utility from their resources. Cloud Computing technology play a major role in helping organizations to
reduce the operational cost and it is a model for enabling convenient, on-demand network access to a shared pool
of configurable computing resources. Cloud consumers are allowed to upload and execute their code inside Cloud
Instances(CI) to perform different tasks. At the same time they need to run applications which they cannot trust
completely. A compelling approach is needed to mitigate the security risk of executing untrusted applications that
could potentially corrupt the resources available for CIs. This paper proposes a confined execution environment,
which provides security and protection for CIs running untrusted applications. Cloud consumers can enable the
proposed confined execution environment as and when required. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
The Engineering Research Unit, University of Moratuwa |
en_US |
dc.title |
Building sand castles within iaas - based cloud instances |
en_US |
dc.type |
Conference-Full-text |
en_US |
dc.identifier.faculty |
Engineering |
en_US |
dc.identifier.department |
Engineering Research Unit, University of Moratuwa |
en_US |
dc.identifier.year |
2013 |
en_US |
dc.identifier.conference |
National Engineering Conference Engineering Research For Nation Building |
en_US |
dc.identifier.place |
Katubedda |
en_US |
dc.identifier.pgnos |
pp. 90-95 |
en_US |
dc.identifier.proceeding |
Proceedings of the 18th Annual Research Symposium |
en_US |