메뉴 건너뛰기




Volumn , Issue , 2009, Pages 129-135

A two-step execution mechanism for thin secure hypervisors

Author keywords

[No Author keywords available]

Indexed keywords

HYPERVISOR; LINES OF CODE; MEASUREMENT RESULTS; OPERATING SYSTEMS; PROTOTYPE IMPLEMENTATIONS; RUNTIMES; SECURITY SERVICES; SECURITY VULNERABILITIES; TRUSTED COMPUTING BASE; VIRTUAL MACHINE MONITORS;

EID: 70449466613     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECURWARE.2009.27     Document Type: Conference Paper
Times cited : (2)

References (22)
  • 1
    • 0041983776 scopus 로고
    • VM/370 - a study of multiplicity and usefulness
    • L. Seawright and R. MacKinnon. VM/370 - a study of multiplicity and usefulness. IBM Systems Journal, pages 4-17, 1979.
    • (1979) IBM Systems Journal , pp. 4-17
    • Seawright, L.1    MacKinnon, R.2
  • 2
    • 85126498840 scopus 로고    scopus 로고
    • Stuart E. Madnick and John J. Donovan. Application and analysis of the virtual machine approach to information system security and isolation, Proceedings of the workshop on virtual computer systems. In ACM Press, pages 210-224, 1973.
    • Stuart E. Madnick and John J. Donovan. Application and analysis of the virtual machine approach to information system security and isolation, Proceedings of the workshop on virtual computer systems. In ACM Press, pages 210-224, 1973.
  • 3
    • 70449480065 scopus 로고    scopus 로고
    • Epartment of defense trusted computer system evaluation criteria
    • DEPARTMENT OF DEFENSE STANDARD, Dec
    • DEPARTMENT OF DEFENSE STANDARD. Epartment of defense trusted computer system evaluation criteria. DoD 5200.28-STD, Dec 1998.
    • (1998) DoD 5200.28-STD
  • 7
    • 70449500402 scopus 로고    scopus 로고
    • VMware. http://www.vmware.com/.
    • VMware
  • 10
    • 70449464049 scopus 로고    scopus 로고
    • VMware. VMware ESX Server Virtual Infrastructure Node Evaluators Guide, 2005. http://www.vmware.com/pdf/esx vin eval.pdf.
    • VMware. VMware ESX Server Virtual Infrastructure Node Evaluators Guide, 2005. http://www.vmware.com/pdf/esx vin eval.pdf.
  • 13
    • 70449501898 scopus 로고    scopus 로고
    • Towards Virtual Passthrough I/O on Commodity Devices
    • Muli Ben-Yehuda, Alan L. Cox, and Scott Rixner, editors, USENIX Association
    • Lei Xia, Jack Lange, and Peter A. Dinda. Towards Virtual Passthrough I/O on Commodity Devices. In Muli Ben-Yehuda, Alan L. Cox, and Scott Rixner, editors, Workshop on I/O Virtualization. USENIX Association, 2008.
    • (2008) Workshop on I/O Virtualization
    • Xia, L.1    Lange, J.2    Dinda, P.A.3
  • 15
    • 67049174120 scopus 로고    scopus 로고
    • Design and Implementation of a Portable IDManagement Framework for a Secure Virtual Machine Monitor
    • Dynamic Publishers
    • Manabu Hirano, Takeshi Okuda, Eiji Kawai and Suguru Yamaguchi. Design and Implementation of a Portable IDManagement Framework for a Secure Virtual Machine Monitor. Journal of Information Assurance and Security (JIAS), Dynamic Publishers, 2:211-216, 2007.
    • (2007) Journal of Information Assurance and Security (JIAS) , vol.2 , pp. 211-216
    • Hirano, M.1    Okuda, T.2    Kawai, E.3    Yamaguchi, S.4
  • 20
    • 70449471928 scopus 로고    scopus 로고
    • RSA Laboratories. PKCS #11: Cryptographic Token Interface Standard v2.20, 2001.
    • RSA Laboratories. PKCS #11: Cryptographic Token Interface Standard v2.20, 2001.
  • 21
    • 70449480066 scopus 로고    scopus 로고
    • PC/SC Workgroup. PC/SC Workgroup Specifications 2.01.5, 2008.
    • PC/SC Workgroup. PC/SC Workgroup Specifications 2.01.5, 2008.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.