A Deployment Scenario : A Taxonomy Mapping and Keyword Searching for the Application Relation

Authors

  • Sharipah Setapa Advanced Computing Lab, Mimos Berhad, Kuala Lumpur
  • Shahrol Hisham Baharom Advanced Computing Lab, Mimos Berhad, Kuala Lumpur
  • Luke Jing Yuan Advanced Computing Lab, Mimos Berhad, Kuala Lumpur

DOI:

https://doi.org/10.24191/ji.v14i2.224

Keywords:

Design scenario, strategic way, taxonomy, keyword, application

Abstract

Upgrading and patching is a method to strengthen the host and virtualisation devices from malware. Inthe deployment to different entity’s clients, different scenarios are faced to support their business process.A host and virtual machine (VM) are dependent on each other to provide high efficiency. A good design ofvirtual resources in a physical host can maintain the host’s efficiency. If the host is to be upgraded orpatched, then the relationship with VM needs to be explored to avoid missing or malfunctioning of certainapplication on the host or VM. A relationship how to check whether the application scenario is workingas expected is not being derived. This paper will discuss scenarios that we face and how it can beconverted into taxonomy to provide a strategic approach when upgrading a specific item. With that, ananalogy can be based on how the application scenario can be established as a model and converted intotaxonomy for troubleshooting when execution is facing an error. Keywords: Design scenario, strategic way, taxonomy, keyword, application. 

References

Zhou, W., Ning, P., Zhang, X., Ammons, G., Wang, R., & Bala, V. 2010. Always up-to-date – Scalable offline patching of VM images in a compute cloud. Paper presented at Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA.
Scarfone, K., Soupp, M., & Johnson, P. M. 2005. Guidance for securing Microsoft Windows XP systems for IT professionals: A NIST Security Configuration Checklist. Recommendations of the National Institute of Standards and Technology. NIST Special Publication 800-68.
Morsy, M. A., Grundy, J., & Müller, I. 2010. An analysis of the cloud computing security problem. Presented at Asia Pacific Cloud Workshop, Colocated with APSEC2010, Australia.
Priya Iyer, K.B., Priya, P., & Anusha, R. 2014. Analysis on Cloud Computing Security Issues, Threats and Solutions. Presented at International Conference on Communication, Computing and Information Technology (ICCCMIT-2014).
Basu, S., Sengupta, A., & Mazumdar, C. 2017. A Quantitative Methodology for Cloud Security Risk Assessment. Presented at 7th International Conference on Cloud Computing and Services Science.
Chakraborty, A., & Stewart, G. 2012. Strategy Taxonomy and Classification System Development – Study of two State Governments. Presented at Sixth IEEE International Conference on Management of Innovations and Technology.
Doty, D. H., & Glick, W.H., 1994. Typologies as a unique form of theory building: Toward improved understanding and modelling. Journal Academy of Management,19, p.230.
Bruce Croft, W., Metzler, D., & Strohman, T. 2010. Search Engines: Information retrieval in practice. Boston, Massachusetts: Pearson Education.

Downloads

Published

2019-11-29