메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 267-275

Multi-level security requirements for hypervisors

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; PUBLIC KEY CRYPTOGRAPHY; SYSTEMS ANALYSIS; VIRTUAL REALITY;

EID: 33846280529     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2005.41     Document Type: Conference Paper
Times cited : (34)

References (49)
  • 1
    • 33846289434 scopus 로고    scopus 로고
    • AMD64 Virtualization Codenamed Pacifica Technology: Secure Virtual Machine Architecture Reference Manual, Publication No. 33047, Revision 3.01, May 2005, Advanced Micro Devices: Sunnyvale, CA. URL: http://www.amd.com/us-en/assets/content_type/white_papers_and_tech_docs/ 33047.pdf
    • AMD64 Virtualization Codenamed "Pacifica" Technology: Secure Virtual Machine Architecture Reference Manual, Publication No. 33047, Revision 3.01, May 2005, Advanced Micro Devices: Sunnyvale, CA. URL: http://www.amd.com/us-en/assets/content_type/white_papers_and_tech_docs/ 33047.pdf
  • 2
    • 33846284016 scopus 로고    scopus 로고
    • Certification Report for Processor Resource/ System Manager (PR/SM) for the IBM eServer zSeries 900, BSI-DSZ-CC-0179-2003,27 February 2003, Bundesamt für Sicherheit in der Informationstechnik: Bonn, Germany. URL: http://www.commoncriteriaportal.org/public/files/epfiles/0179a.pdf
    • Certification Report for Processor Resource/ System Manager (PR/SM) for the IBM eServer zSeries 900, BSI-DSZ-CC-0179-2003,27 February 2003, Bundesamt für Sicherheit in der Informationstechnik: Bonn, Germany. URL: http://www.commoncriteriaportal.org/public/files/epfiles/0179a.pdf
  • 3
    • 33846292061 scopus 로고    scopus 로고
    • Certification Report: BAE SYSTEMS, Trusted Filter Version 1.0, Certificate Number: 2001/19, July 2001, Defense Signals Directorate, Australasian Certification Authority: Kingston, ACT, Australia. URL
    • Certification Report: BAE SYSTEMS - Trusted Filter Version 1.0, Certificate Number: 2001/19, July 2001, Defense Signals Directorate - Australasian Certification Authority: Kingston, ACT, Australia. URL: http://www.dsd.gov.au/infosec/evaluation_services/epl/network_security/ BAESystems_TrustedFilter.html
  • 4
    • 33846320675 scopus 로고    scopus 로고
    • Computer Security Requirements - Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments, CSC-STD-003-85, 25 June 1985, DoD Computer Security Center: Ft. George G. Meade, MD. URL: http://www.radium.ncsc.mil/tpep/library/ rainbow/index.html
    • Computer Security Requirements - Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments, CSC-STD-003-85, 25 June 1985, DoD Computer Security Center: Ft. George G. Meade, MD. URL: http://www.radium.ncsc.mil/tpep/library/ rainbow/index.html
  • 5
    • 33846304090 scopus 로고    scopus 로고
    • Department of Defense Trusted Computer System Evaluation Criteria, DOD 5200.28-STD, December 1985: Washington, DC. URL: http://csrc.nist.gov/ publications/history/dod85.pdf
    • Department of Defense Trusted Computer System Evaluation Criteria, DOD 5200.28-STD, December 1985: Washington, DC. URL: http://csrc.nist.gov/ publications/history/dod85.pdf
  • 6
    • 33846307634 scopus 로고    scopus 로고
    • DoD Information Technology Security Certification and Accreditation Process (DITSCAP), DoD Instruction 5200.40, 30 December 1997, Department of Defense: Washington, DC. URL: http://www.dtic.mil/whs/directives/corres/pdf/ i520040_123097/i520040p.pdf
    • DoD Information Technology Security Certification and Accreditation Process (DITSCAP), DoD Instruction 5200.40, 30 December 1997, Department of Defense: Washington, DC. URL: http://www.dtic.mil/whs/directives/corres/pdf/ i520040_123097/i520040p.pdf
  • 11
    • 33846270196 scopus 로고    scopus 로고
    • Security Requirements for Automatic Data Processing (ADP) Systems, DoD Directive 5200.28, 18 December 1972, Department of Defense: Washington, DC.
    • Security Requirements for Automatic Data Processing (ADP) Systems, DoD Directive 5200.28, 18 December 1972, Department of Defense: Washington, DC.
  • 12
    • 33846321059 scopus 로고    scopus 로고
    • Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements - Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments, CSC-STD-004-85, 25 June 1985, DoD Computer Security Center: Ft. George G. Meade, MD. URL: http://www.radium.nc sc.mil/tpep/library/rainbow/index.html
    • Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements - Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments, CSC-STD-004-85, 25 June 1985, DoD Computer Security Center: Ft. George G. Meade, MD. URL: http://www.radium.nc sc.mil/tpep/library/rainbow/index.html
  • 13
    • 33846327792 scopus 로고
    • Techniques and Procedures for Implementing, Deactivating, Testing, and Evaluating Secure Resource-Sharing ADP Systems
    • January, Department of Defense: Washington, DC
    • Techniques and Procedures for Implementing, Deactivating, Testing, and Evaluating Secure Resource-Sharing ADP Systems, DoD 5200.28-M, January 1973, Department of Defense: Washington, DC.
    • (1973) DoD 5200.28-M
  • 14
    • 33846266067 scopus 로고    scopus 로고
    • Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria, NCSC-TG-005, Version-1, 31 July 1987, National Computer Security Center: Ft. George G. Meade, MD. URL: http://www.radiimi.ncsc.mil/ tpep/library/tcsec/index.html
    • Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria, NCSC-TG-005, Version-1, 31 July 1987, National Computer Security Center: Ft. George G. Meade, MD. URL: http://www.radiimi.ncsc.mil/ tpep/library/tcsec/index.html
  • 15
    • 33645356018 scopus 로고
    • A Virtual Machine System for the 360/40
    • Report 320-2007, May, IBM Cambridge Scientific Center: Cambridge, MA
    • Adair, R.J., R.U. Bayles, L.W. Comeau, and R.J. Creasy, A Virtual Machine System for the 360/40, Report 320-2007, May 1966, IBM Cambridge Scientific Center: Cambridge, MA.
    • (1966)
    • Adair, R.J.1    Bayles, R.U.2    Comeau, L.W.3    Creasy, R.J.4
  • 17
    • 33846334300 scopus 로고    scopus 로고
    • Barham, P., B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the Art of Virtualizatian. in Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles (SOSP). 19-22 October 2003, Bolton Landing, NY: ACM Press. URL: http://www.cl.catn.ac.uk/Research/SRG/netos/papers/2003-xensosp.pdf
    • Barham, P., B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the Art of Virtualizatian. in Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles (SOSP). 19-22 October 2003, Bolton Landing, NY: ACM Press. URL: http://www.cl.catn.ac.uk/Research/SRG/netos/papers/2003-xensosp.pdf
  • 18
    • 33846276748 scopus 로고    scopus 로고
    • Bell, D.E. and L.J. LaPadula, Computer Security Model: Unified Exposition and Multics Interpretation, ESD-TR-75-306, March 1976, The MITRE Corporation, Bedford, MA: HQ Electronic Systems Division, Hanscom AFB, MA. URL: http://csrc.nist.gov/publications/history/bell76.pdf
    • Bell, D.E. and L.J. LaPadula, Computer Security Model: Unified Exposition and Multics Interpretation, ESD-TR-75-306, March 1976, The MITRE Corporation, Bedford, MA: HQ Electronic Systems Division, Hanscom AFB, MA. URL: http://csrc.nist.gov/publications/history/bell76.pdf
  • 20
    • 33846288738 scopus 로고    scopus 로고
    • Broadbridge, R. and J. Mekota, Secure Communications Processor Specification, ESD-TR-76-351, II, June 1976, Honeywell Information Systems, Inc., McLean, VA: HQ Electronic Systems Division, Hanscom AFB, MA.
    • Broadbridge, R. and J. Mekota, Secure Communications Processor Specification, ESD-TR-76-351, Vol. II, June 1976, Honeywell Information Systems, Inc., McLean, VA: HQ Electronic Systems Division, Hanscom AFB, MA.
  • 21
    • 0026157231 scopus 로고    scopus 로고
    • Hall, J.S. and P.T. Robinson. Virtualizing the VAX Architecture, in 18th International Symposium on Computer Architecture. May 1991, Toronto, ON, Canada: published in Computer Architecture News, 19. p. 380-389.
    • Hall, J.S. and P.T. Robinson. Virtualizing the VAX Architecture, in 18th International Symposium on Computer Architecture. May 1991, Toronto, ON, Canada: published in Computer Architecture News, vol. 19. p. 380-389.
  • 22
    • 0018289092 scopus 로고
    • Evolution of a Virtual Machine Subsystem
    • URL
    • Hendricks, E.C. and T.C. Hartmann, Evolution of a Virtual Machine Subsystem. IBM Systems Journal, 1979. 18(1): p. 111-142. URL: http://domino.research.ibm.com/tchjr/journalindex.nsf/SysVolumes?OpenView
    • (1979) IBM Systems Journal , vol.18 , Issue.1 , pp. 111-142
    • Hendricks, E.C.1    Hartmann, T.C.2
  • 23
    • 33846268995 scopus 로고    scopus 로고
    • Hinke, T.H. and M. Schaefer, Secure Data Management System, RADC-TR-75-266 [NTIS AD A019201], November 1975, Rome Air Development Center: Griffiss AFB, NY.
    • Hinke, T.H. and M. Schaefer, Secure Data Management System, RADC-TR-75-266 [NTIS AD A019201], November 1975, Rome Air Development Center: Griffiss AFB, NY.
  • 24
    • 0038253143 scopus 로고    scopus 로고
    • Improving Security and Performance for Capability Systems
    • No. 149, October 1988, University of Cambridge: Cambridge, England
    • Karger, P.A., Improving Security and Performance for Capability Systems, Computer Laboratory Technical Report No. 149, October 1988, University of Cambridge: Cambridge, England.
    • Computer Laboratory Technical Report
    • Karger, P.A.1
  • 25
    • 33846283267 scopus 로고    scopus 로고
    • Karger, P.A., Multi-Organizational Mandatory Access Controls for Commercial Applications, RC 21673 (97655), 22 February 2000, IBM Research Division, Thomas J. Watson Research Center: Yorktown Heights, NY. URL: http://domino.watson.ibm.com/library/CyberDig.nsf/home
    • Karger, P.A., Multi-Organizational Mandatory Access Controls for Commercial Applications, RC 21673 (97655), 22 February 2000, IBM Research Division, Thomas J. Watson Research Center: Yorktown Heights, NY. URL: http://domino.watson.ibm.com/library/CyberDig.nsf/home
  • 26
    • 33846282209 scopus 로고    scopus 로고
    • Karger, P.A., Non-Discretionary Access Control for Decentralized Computing Systems, S. M. & E. E. thesis 1977, Laboratory for Computer Science, Massachusetts Institute of Technology: Cambridge, MA. URL: http://ncstrl.mit.edu:80/Dienst/UI/2.0/Describe/ncstrl. mit_1cs%2fMIT%2ILCS%2fTR-L179
    • Karger, P.A., Non-Discretionary Access Control for Decentralized Computing Systems, S. M. & E. E. thesis 1977, Laboratory for Computer Science, Massachusetts Institute of Technology: Cambridge, MA. URL: http://ncstrl.mit.edu:80/Dienst/UI/2.0/Describe/ncstrl. mit_1cs%2fMIT%2ILCS%2fTR-L179
  • 27
    • 33846328213 scopus 로고    scopus 로고
    • Karger, P.A. Non-Discretionary Security for Decentralized Computing Systems: Host to Host Protocols. in Trends and Applications: 1978 Distributed Processing. 18 May 1978, National Bureau of Standards, Gaithersburg, MD: IEEE. p. 32-39.
    • Karger, P.A. Non-Discretionary Security for Decentralized Computing Systems: Host to Host Protocols. in Trends and Applications: 1978 Distributed Processing. 18 May 1978, National Bureau of Standards, Gaithersburg, MD: IEEE. p. 32-39.
  • 29
    • 33644484966 scopus 로고    scopus 로고
    • Using a Mandatory Secrecy and Integrity Policy on Smart Cards and Mobile Devices
    • 13-15 June, Marseilles, France: p
    • Karger, P.A., V.R. Austel, and B.C. Toll. Using a Mandatory Secrecy and Integrity Policy on Smart Cards and Mobile Devices, in EUROSMART Security Conference. 13-15 June 2000, Marseilles, France: p. 134-148.
    • (2000) EUROSMART Security Conference , pp. 134-148
    • Karger, P.A.1    Austel, V.R.2    Toll, B.C.3
  • 30
    • 84956989246 scopus 로고    scopus 로고
    • Using Mandatory Secrecy and Integrity for Business to Business Applications on Mobile Devices
    • 25-27 September, Naval Postgraduate School, Monterey, CA: published on CB-ROM. URL
    • Karger, P.A., V.R. Austel, and B.C. Toll. Using Mandatory Secrecy and Integrity for Business to Business Applications on Mobile Devices, in Workshop on Innovations in Strong Access Control. 25-27 September 2000, Naval Postgraduate School, Monterey, CA: published on CB-ROM. URL: http://www.acsac.org/sac-tac/wisac00/wed0830.karger.pdf
    • (2000) Workshop on Innovations in Strong Access Control
    • Karger, P.A.1    Austel, V.R.2    Toll, B.C.3
  • 31
    • 84948969398 scopus 로고    scopus 로고
    • Thirty Years Later: Lessons from the Multics Security Evaluation
    • 9-13 December, Las Vegas, NV: IEEE Computer Society, p, URL
    • Karger, P.A. and R.R. Schell. Thirty Years Later: Lessons from the Multics Security Evaluation, in Proceedings of the 18th Annual Computer Security Applications Conference. 9-13 December 2002, Las Vegas, NV: IEEE Computer Society, p. 119-126. URL: http://www.acsac.org/2002/papers/classic- multics.pdf
    • (2002) Proceedings of the 18th Annual Computer Security Applications Conference , pp. 119-126
    • Karger, P.A.1    Schell, R.R.2
  • 33
    • 33846302646 scopus 로고    scopus 로고
    • Kerner, S.M., IBM Offers Support for Xen. internetnews.com, 19 January 2005. URL: http://www.internetnews.com/dev-news/article.php/ 3461481
    • Kerner, S.M., IBM Offers Support for Xen. internetnews.com, 19 January 2005. URL: http://www.internetnews.com/dev-news/article.php/ 3461481
  • 34
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • October
    • Lampson, B.W., A note on the confinement problem. Communications of the ACM, October 1973.16(10): p. 613-615.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 35
    • 0018734180 scopus 로고
    • On the duality of operating system structures
    • B. Lanciaux, Editor, North-Holland: Amsterdam, p
    • Lauer, H.C. and R.M. Needham, On the duality of operating system structures, in Operating Systems: Theory and Practice, B. Lanciaux, Editor. 1979, North-Holland: Amsterdam, p. 371-384.
    • (1979) Operating Systems: Theory and Practice , pp. 371-384
    • Lauer, H.C.1    Needham, R.M.2
  • 36
    • 33846283266 scopus 로고
    • A Time-Sharing System Using an Associative Memory
    • December
    • Lindquist, A.B., R.R. Seeber, and L.W. Comeau, A Time-Sharing System Using an Associative Memory. Proceedings of the IEEE, December 1966. 54(12): p. 1774-1779.
    • (1966) Proceedings of the IEEE , vol.54 , Issue.12 , pp. 1774-1779
    • Lindquist, A.B.1    Seeber, R.R.2    Comeau, L.W.3
  • 37
    • 84945721946 scopus 로고    scopus 로고
    • Lipner, S.B.,A comment on the confinement problem. Operating Systems Review, 19-21 November 1975. 9(5): p. 192-196. Proceedings of the Fifth Symposium on Operating Systems Principles.
    • Lipner, S.B.,A comment on the confinement problem. Operating Systems Review, 19-21 November 1975. 9(5): p. 192-196. Proceedings of the Fifth Symposium on Operating Systems Principles.
  • 39
    • 84879848814 scopus 로고
    • Application and Analysis of the Virtual Machine Approach to Information System Security
    • 26-27 March, Cambridge, MA: Association for Computing Machinery, p, URL
    • Madnick, S.E. and J. J. Donovan. Application and Analysis of the Virtual Machine Approach to Information System Security, in Proceedings of the ACM SIGARCH-SIGOPS Workshop on Virtual Computer Systems. 26-27 March 1973, Cambridge, MA: Association for Computing Machinery, p. 210-224. URL: http://portal.acm.org/citation.cfm?id=803961
    • (1973) Proceedings of the ACM SIGARCH-SIGOPS Workshop on Virtual Computer Systems , pp. 210-224
    • Madnick, S.E.1    Donovan, J.J.2
  • 40
    • 33751069196 scopus 로고    scopus 로고
    • NetTop: Commercial Technology in High Assurance Applications
    • Fall, URL
    • Meushaw, R. and D. Simard, NetTop: Commercial Technology in High Assurance Applications. National Security Agency Tech Trend Notes, Fall 2000. 9(4): p. 3-10. URL: http://www.vmwaro.coni/pdf/ TechTrondNotes.pdf
    • (2000) National Security Agency Tech Trend Notes , vol.9 , Issue.4 , pp. 3-10
    • Meushaw, R.1    Simard, D.2
  • 41
    • 0004246059 scopus 로고
    • RFC 959, October, Network Working Group. URL
    • Postel, J. and J. Reynolds, File Transfer Protocol (FTP), RFC 959, October 1985, Network Working Group. URL: http://www.ietf.org/rfc/rfc959. txt
    • (1985) File Transfer Protocol (FTP)
    • Postel, J.1    Reynolds, J.2
  • 42
    • 0018434466 scopus 로고
    • Synchronization with Eventcounts and Sequencers
    • February
    • Reed, D.P. and R.K. Kanodia, Synchronization with Eventcounts and Sequencers. Comm. ACM, February 1979. 22(2): p. 115-123.
    • (1979) Comm. ACM , vol.22 , Issue.2 , pp. 115-123
    • Reed, D.P.1    Kanodia, R.K.2
  • 43
    • 0020779556 scopus 로고
    • Distributed Secure System
    • July, URL
    • Rushby, J. and B. Randell, Distributed Secure System. IEEE Computer, July 1983.16(7): p. 55-67. URL: http://www.csl.sri.com/ users/rushby/abstracts/computer83
    • (1983) IEEE Computer , vol.16 , Issue.7 , pp. 55-67
    • Rushby, J.1    Randell, B.2
  • 44
    • 33846287428 scopus 로고    scopus 로고
    • Sailer, R., T. Jaeger, J.L. Griffin, S. Berger, L. van Doom, R. Perez, and E. Valdez, Building a General-purpose Secure Virtual Machine Monitor, RC23537 (W0502-132), 25 February 2005, IBM Research Division, Thomas J. Watson Research Center: Yorktown Heights, NY. URL: http://domino.watson.ibm.com/ library/CyberDig.nsf/home
    • Sailer, R., T. Jaeger, J.L. Griffin, S. Berger, L. van Doom, R. Perez, and E. Valdez, Building a General-purpose Secure Virtual Machine Monitor, RC23537 (W0502-132), 25 February 2005, IBM Research Division, Thomas J. Watson Research Center: Yorktown Heights, NY. URL: http://domino.watson.ibm.com/ library/CyberDig.nsf/home
  • 47
    • 0142157011 scopus 로고    scopus 로고
    • Scherzer, H., R. Canetti, P.A. Karger, H. Krawczyk, T. Rabin, and D.C. Toll. Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. in 8th European Symposium on Research in Computer Security (ESORICS 2003). 13-15 October 2003, Gjøvik, Norway:Lecture Notes in Computer Science 2808. Springer Verlag, p. 181-200.
    • Scherzer, H., R. Canetti, P.A. Karger, H. Krawczyk, T. Rabin, and D.C. Toll. Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. in 8th European Symposium on Research in Computer Security (ESORICS 2003). 13-15 October 2003, Gjøvik, Norway:Lecture Notes in Computer Science Vol. 2808. Springer Verlag, p. 181-200.
  • 48
    • 33748161983 scopus 로고    scopus 로고
    • NAI Labs Report #02-007, June, NAI Labs: Glenwood, MD. URL
    • Smalley, S., Configuring the SEL inux Policy, NAI Labs Report #02-007, June 2002, NAI Labs: Glenwood, MD. URL: http://www.nsa.gov/selinux/ policy2-abs.html
    • (2002) Configuring the SEL inux Policy
    • Smalley, S.1
  • 49
    • 33646837783 scopus 로고    scopus 로고
    • VM and the VM Community: Past Present, and Future
    • August, URL
    • Varian, M. VM and the VM Community: Past Present, and Future, in SHARE 89, Sessions 9059-9061. August 1997. URL: http://pucc.princdon. edu/~melinda/25paper.pdf
    • (1997) SHARE 89, Sessions , pp. 9059-9061
    • Varian, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.