## A novel architecture for enhanced security through virtualisation and spoofing "Everyone thinks it's a good idea to be able to make free phone calls from anywhere but, in effect, it's a darknet service. Skype is a peer-to-peer network, data is encrypted although not anonymised, and you can't con
Security in a virtualised world
β Scribed by Kevin Sloan
- Publisher
- Elsevier Science
- Year
- 2009
- Tongue
- English
- Weight
- 312 KB
- Volume
- 2009
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
β¦ Synopsis
Cynics might well say that cloud computing is just hype. It is, after all, based on today's rather than tomorrow's technology: all the technical ingredients are well established. In fact, in a sense it could be argued that it is yesterday's technology reborn. Utility-based computing has been a familiar concept since the 1960s, when it was born as the 'computer bureau'.
However, there has been a shift. Many recent internet innovations are based on the cloud proposition. In the future, we'll see the joining up of these services to provide ubiquitous computing. On top of that, as organisations look to rationalise their own internal computing, they are considering a virtualised model.
π SIMILAR VOLUMES
Embedded systems have become an integral part of our everyday life. Devices like vehicles, household appliances, and cell phones are already equipped with embedded microcontrollers. The networking of the myriads of embedded devices gives rise to the brave new world of pervasive computing. Pervasive