By Topic

Managing Some Security Risks Related to the Deployment of Multifarious Authentication and Authorization in a Virtualized Environment

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Annette Tolnai ; Dept. for Inf. Technol., Univ. of Johannesburg, Johannesburg, South Africa ; Sebastiaan von Solms

A security breach may result in unintended information or data leakage. In virtualized environments, this aspect is especially important because security issues that are currently unknown could exist, where the same set of data can be accessed by multiple paths. This means multiple authentication and authorization methods exist into that data. Specific management tools can be targets of attacks, since some security risks are easier to target than others. Some of these security risks include authentication issues, roles and permissions as well as access restrictions. This paper will discuss the security risks during management and deployment including proposed solutions, as well as some of the solutions to mitigate the security risks of multifarious authentication and authorization in a virtualized environment.

Published in:

Broadband, Wireless Computing, Communication and Applications (BWCCA), 2010 International Conference on

Date of Conference:

4-6 Nov. 2010