|
Volumn 44, Issue 4, 2010, Pages 86-94
|
Virtualizing networking and security in the cloud
|
Author keywords
[No Author keywords available]
|
Indexed keywords
ADDITIONAL FLEXIBILITIES;
ARCHITECTURAL CHANGES;
BLIND SPOTS;
CLOUD COMPUTING;
CO-LOCATED;
COMPUTER WORKLOADS;
DATA CENTERS;
DATA LEAKAGE;
DATACENTER;
DESKTOP VIRTUALIZATION;
DISTRIBUTED POWER;
DISTRIBUTED SECURITY;
DYNAMIC POLICY;
ENTERPRISE DATA;
FLOW MONITORING;
HIGH AVAILABILITY;
HOST SERVERS;
INGRESS/EGRESS;
IP ADDRESSS;
IP SPOOFING;
LIFE-CYCLE MANAGEMENT;
LIVE MIGRATIONS;
MASSIVE TRANSFORMATIONS;
MULTI-CORE PLATFORMS;
NETWORK FLOWS;
NETWORK STACK;
ON-THE-FLY;
PHYSICAL SECURITY;
PHYSICAL WORLD;
POINT-BASED;
PRODUCT-LINES;
PROGRAMMABILITY;
SCALE OUTS;
SCALE-UP;
SECURITY ANALYSIS;
SECURITY APPLIANCES;
SECURITY POLICY;
SERVER CONSOLIDATION;
SINGLE CHOKES;
STATIC NETWORKS;
VIRTUAL APPLIANCE;
VIRTUAL MACHINES;
VIRTUAL WORLDS;
VIRTUALIZATIONS;
CLONING;
CLUSTER COMPUTING;
COMPUTER VIRUSES;
ENERGY MANAGEMENT;
FAULT TOLERANCE;
INDUSTRY;
INSPECTION;
METADATA;
NETWORK ARCHITECTURE;
NETWORK LAYERS;
QUALITY ASSURANCE;
SATELLITE COMMUNICATION SYSTEMS;
SECURITY SYSTEMS;
SERVERS;
THROUGHPUT;
VIRTUAL REALITY;
NETWORK SECURITY;
|
EID: 78650746425
PISSN: 01635980
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/1899928.1899939 Document Type: Article |
Times cited : (37)
|
References (9)
|