Managing some security risks related to the deployment of multifarious authentication and authorization in a virtualized environment

Annette Tolnai, Sebastiaan Von Solms

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

A security breach may result in unintended information or data leakage. In virtualized environments, this aspect is especially important because security issues that are currently unknown could exist, where the same set of data can be accessed by multiple paths. This means multiple authentication and authorization methods exist into that data. Specific management tools can be targets of attacks, since some security risks are easier to target than others. Some of these security risks include authentication issues, roles and permissions as well as access restrictions. This paper will discuss the security risks during management and deployment including proposed solutions, as well as some of the solutions to mitigate the security risks of multifarious authentication and authorization in a virtualized environment.

Original languageEnglish
Title of host publicationProceedings - 2010 International Conference on Broadband, Wireless Computing Communication and Applications, BWCCA 2010
Pages112-116
Number of pages5
DOIs
Publication statusPublished - 2010
Event5th International Conference on Broadband Wireless Computing, Communication and Applications, BWCCA 2010 - Fukuoka, Japan
Duration: 4 Nov 20106 Nov 2010

Publication series

NameProceedings - 2010 International Conference on Broadband, Wireless Computing Communication and Applications, BWCCA 2010

Conference

Conference5th International Conference on Broadband Wireless Computing, Communication and Applications, BWCCA 2010
Country/TerritoryJapan
CityFukuoka
Period4/11/106/11/10

Keywords

  • Authentication
  • Authorization
  • Virtualized environment

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Managing some security risks related to the deployment of multifarious authentication and authorization in a virtualized environment'. Together they form a unique fingerprint.

Cite this