Show simple item record

dc.contributor.author Sharma, K
dc.contributor.author Carnage, C
dc.contributor.editor Rodrigo, R
dc.date.accessioned 2022-12-22T06:25:32Z
dc.date.available 2022-12-22T06:25:32Z
dc.date.issued 2013-02
dc.identifier.citation ***** en_US
dc.identifier.uri http://dl.lib.uom.lk/handle/123/19863
dc.description.abstract Enterprises continually seek innovative approaches to reduce operational computing costs while extracting the maximum utility from their resources. Cloud Computing technology play a major role in helping organizations to reduce the operational cost and it is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources. Cloud consumers are allowed to upload and execute their code inside Cloud Instances(CI) to perform different tasks. At the same time they need to run applications which they cannot trust completely. A compelling approach is needed to mitigate the security risk of executing untrusted applications that could potentially corrupt the resources available for CIs. This paper proposes a confined execution environment, which provides security and protection for CIs running untrusted applications. Cloud consumers can enable the proposed confined execution environment as and when required. en_US
dc.language.iso en en_US
dc.publisher The Engineering Research Unit, University of Moratuwa en_US
dc.title Building sand castles within iaas - based cloud instances en_US
dc.type Conference-Full-text en_US
dc.identifier.faculty Engineering en_US
dc.identifier.department Engineering Research Unit, University of Moratuwa en_US
dc.identifier.year 2013 en_US
dc.identifier.conference National Engineering Conference Engineering Research For Nation Building en_US
dc.identifier.place Katubedda en_US
dc.identifier.pgnos pp. 90-95 en_US
dc.identifier.proceeding Proceedings of the 18th Annual Research Symposium en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record