메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 276-285

Building a MAC-based security architecture for the Xen open-source hypervisor

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; DATA PRIVACY; ROBUSTNESS (CONTROL SYSTEMS); VIRTUAL REALITY;

EID: 33750248123     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2005.13     Document Type: Conference Paper
Times cited : (215)

References (35)
  • 1
    • 33846297184 scopus 로고    scopus 로고
    • TCG TPM Specification Version 1.2. http://www.trustedcomputinggroup.org.
    • TCG TPM Specification Version 1.2. http://www.trustedcomputinggroup.org.
  • 2
    • 33846267157 scopus 로고    scopus 로고
    • Advanced Micro Devices. AMD64 Virtualization Codenamed Pacifica Technology, Secure Virtual Machine Architecture Reference Manual, Rev 3.01, May 2005. http://www.amd.com/us-en/assets/content_type/ white_papers_and_tech_docs/33047.pdf.
    • Advanced Micro Devices. AMD64 Virtualization Codenamed "Pacifica" Technology, Secure Virtual Machine Architecture Reference Manual, Rev 3.01, May 2005. http://www.amd.com/us-en/assets/content_type/ white_papers_and_tech_docs/33047.pdf.
  • 4
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and multics interpretation
    • Technical report, MITRE MTR-2997, March
    • D. E. Bell and L. J. LaPadula. Secure computer systems: Unified exposition and multics interpretation. Technical report, MITRE MTR-2997, March 1976.
    • (1976)
    • Bell, D.E.1    LaPadula, L.J.2
  • 5
    • 0003400255 scopus 로고
    • Integrity Considerations for Secure Computer Systems
    • Technical Report MTR-3153, Mitre Corporation, Mitre Corp, Bedford MA, June
    • K. J. Biba. Integrity Considerations for Secure Computer Systems. Technical Report MTR-3153, Mitre Corporation, Mitre Corp, Bedford MA, June 1975.
    • (1975)
    • Biba, K.J.1
  • 12
    • 84926427148 scopus 로고
    • Survey of Virtual Machine Research
    • R. P. Goldberg. Survey of Virtual Machine Research. IEEE Computer Magazine, 7(6):34-45, 1974.
    • (1974) IEEE Computer Magazine , vol.7 , Issue.6 , pp. 34-45
    • Goldberg, R.P.1
  • 14
    • 33846290874 scopus 로고    scopus 로고
    • IBM Research, Multi-Purpose Research Hypervisor
    • IBM Research. The Research Hypervisor - A Multi-Platform, Multi-Purpose Research Hypervisor. http://www.research.ibm.com/ hypervisor.
    • The Research Hypervisor - A Multi-Platform
  • 15
    • 33846274417 scopus 로고    scopus 로고
    • Intel. Intel Virtualization Technology Specification for the IA-32 Intel Architecture, April 2005. ftp://download.intel.com/technology/computing/vptech/ C97063-002.pdf.
    • Intel. Intel Virtualization Technology Specification for the IA-32 Intel Architecture, April 2005. ftp://download.intel.com/technology/computing/vptech/ C97063-002.pdf.
  • 16
    • 33846274797 scopus 로고    scopus 로고
    • J. P. Anderson et. al. Computer security technology planning study. Technical Report ESD-TR-73-51, I+II, Air Force Systems Command, USAF, 1972.
    • J. P. Anderson et. al. Computer security technology planning study. Technical Report ESD-TR-73-51, Vol. I+II, Air Force Systems Command, USAF, 1972.
  • 17
  • 19
    • 0025137215 scopus 로고    scopus 로고
    • P. A. Karger, M. E. Zurko, D. W. Bonin, A. H. Mason, and C.E. Kahn. A VMM Security Kernel for the VAX Architecture. In Proc. IEEE Symposium on Security and Privacy, May 1990.
    • P. A. Karger, M. E. Zurko, D. W. Bonin, A. H. Mason, and C.E. Kahn. A VMM Security Kernel for the VAX Architecture. In Proc. IEEE Symposium on Security and Privacy, May 1990.
  • 22
    • 84883516955 scopus 로고
    • th Symposium on Operating System Principles
    • th Symposium on Operating System Principles, 1995.
    • (1995)
    • Liedtke, J.1
  • 25
    • 33751069196 scopus 로고    scopus 로고
    • NetTop - Commercial Technology in High Assurance Applications
    • Fall
    • R. Meushaw and D. Simard. NetTop - Commercial Technology in High Assurance Applications. Tech Trend Notes, Fall 2000.
    • (2000) Tech Trend Notes
    • Meushaw, R.1    Simard, D.2
  • 26
    • 33845953872 scopus 로고    scopus 로고
    • National Security Agency, SELinux
    • National Security Agency. Security-Enhanced Linux (SELinux). http://www.nsa.gov/selinux.
    • Security-Enhanced Linux
  • 27
    • 0020273088 scopus 로고
    • Proof of Separability - A verification technique for a class of security kernels
    • Proc. 5th International Symposium on Programming, of, Turin, Italy, Springer-Verlag
    • J. Rushby. Proof of Separability - A verification technique for a class of security kernels. In Proc. 5th International Symposium on Programming, volume 137 of Lecture Notes in Computer Science, pages 352-367, Turin, Italy, 1982. Springer-Verlag.
    • (1982) Lecture Notes in Computer Science , vol.137 , pp. 352-367
    • Rushby, J.1
  • 28
    • 85084162270 scopus 로고    scopus 로고
    • Design and Implementation of a TCG-based Integrity Measurement Architecture
    • August
    • R. Sailer, X. Zhang, T. Jaeger, and L. van Doom. Design and Implementation of a TCG-based Integrity Measurement Architecture. In Thirteenth USENIX Security Symposium, pages 223-238, August 2004.
    • (2004) Thirteenth USENIX Security Symposium , pp. 223-238
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    van Doom, L.4
  • 30
    • 33846278186 scopus 로고    scopus 로고
    • Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card
    • H. Scherzer, R. Canetti, P. A. Karger, H. Krawczyk, T. Rabin, and D. C. Toll. Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. In (ESORICS), 2003.
    • (2003) (ESORICS)
    • Scherzer, H.1    Canetti, R.2    Karger, P.A.3    Krawczyk, H.4    Rabin, T.5    Toll, D.C.6
  • 34
    • 33846328576 scopus 로고    scopus 로고
    • VMware. http://www.vmware.com/.
    • VMware
  • 35
    • 33846311964 scopus 로고    scopus 로고
    • XenSource. http://xenbits.xensource.com/xen-unstable.hg.
    • XenSource


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.