scispace - formally typeset
M

Michael Kletskin

Researcher at CA Technologies

Publications -  5
Citations -  334

Michael Kletskin is an academic researcher from CA Technologies. The author has contributed to research in topics: Virtual machine & Virtualization. The author has an hindex of 5, co-authored 5 publications receiving 334 citations.

Papers
More filters
Patent

System, Method, and Software for Enforcing Access Control Policy Rules on Utility Computing Virtualization in Cloud Computing Systems

TL;DR: In this paper, a policy life cycle component is configured to maintain a repository of security policies, which comprises policies governing access to a virtual host and to a plurality of virtual machines running on the virtual host.
Patent

System and method for enforcement of security controls on virtual machines throughout life cycle state changes

TL;DR: In this article, the authors describe a method for instantiating a guest virtual machine in a virtual computing environment and assigning an identifying certificate, a set of policies, and an encryption key to the guest VM.
Patent

System, method, and software for providing access control enforcement capabilities in cloud computing systems

TL;DR: In this article, a topology manager is configured to maintain a security topology of a plurality of hosts in a cloud computing deployment, and a portability manager is also configured to receive a request to deploy an access control agent on the one or more candidate hosts.
Patent

Trusted public infrastructure grid cloud

TL;DR: In this paper, the authors propose a secure cloud environment that allows for the design and instantiation of a security policy at the infrastructure level, and a security level and a policy to at least one of the at least two selected cloud computing component templates.
Patent

System and method for self-aware virtual machine image deployment enforcement

TL;DR: In this article, the authors present a verification of virtualization environments based on the information received from the enforcement module in response to the request for verification of the virtualization environment. But they do not discuss the verification process itself.