TY - GEN
T1 - Managing some security risks related to the deployment of multifarious authentication and authorization in a virtualized environment
AU - Tolnai, Annette
AU - Von Solms, Sebastiaan
PY - 2010
Y1 - 2010
N2 - A security breach may result in unintended information or data leakage. In virtualized environments, this aspect is especially important because security issues that are currently unknown could exist, where the same set of data can be accessed by multiple paths. This means multiple authentication and authorization methods exist into that data. Specific management tools can be targets of attacks, since some security risks are easier to target than others. Some of these security risks include authentication issues, roles and permissions as well as access restrictions. This paper will discuss the security risks during management and deployment including proposed solutions, as well as some of the solutions to mitigate the security risks of multifarious authentication and authorization in a virtualized environment.
AB - A security breach may result in unintended information or data leakage. In virtualized environments, this aspect is especially important because security issues that are currently unknown could exist, where the same set of data can be accessed by multiple paths. This means multiple authentication and authorization methods exist into that data. Specific management tools can be targets of attacks, since some security risks are easier to target than others. Some of these security risks include authentication issues, roles and permissions as well as access restrictions. This paper will discuss the security risks during management and deployment including proposed solutions, as well as some of the solutions to mitigate the security risks of multifarious authentication and authorization in a virtualized environment.
KW - Authentication
KW - Authorization
KW - Virtualized environment
UR - http://www.scopus.com/inward/record.url?scp=79952097180&partnerID=8YFLogxK
U2 - 10.1109/BWCCA.2010.57
DO - 10.1109/BWCCA.2010.57
M3 - Conference contribution
AN - SCOPUS:79952097180
SN - 9780769542362
T3 - Proceedings - 2010 International Conference on Broadband, Wireless Computing Communication and Applications, BWCCA 2010
SP - 112
EP - 116
BT - Proceedings - 2010 International Conference on Broadband, Wireless Computing Communication and Applications, BWCCA 2010
T2 - 5th International Conference on Broadband Wireless Computing, Communication and Applications, BWCCA 2010
Y2 - 4 November 2010 through 6 November 2010
ER -