-
1
-
-
0041983776
-
VM/370 - a study of multiplicity and usefulness
-
L. Seawright and R. MacKinnon. VM/370 - a study of multiplicity and usefulness. IBM Systems Journal, pages 4-17, 1979.
-
(1979)
IBM Systems Journal
, pp. 4-17
-
-
Seawright, L.1
MacKinnon, R.2
-
2
-
-
85126498840
-
-
Stuart E. Madnick and John J. Donovan. Application and analysis of the virtual machine approach to information system security and isolation, Proceedings of the workshop on virtual computer systems. In ACM Press, pages 210-224, 1973.
-
Stuart E. Madnick and John J. Donovan. Application and analysis of the virtual machine approach to information system security and isolation, Proceedings of the workshop on virtual computer systems. In ACM Press, pages 210-224, 1973.
-
-
-
-
3
-
-
70449480065
-
Epartment of defense trusted computer system evaluation criteria
-
DEPARTMENT OF DEFENSE STANDARD, Dec
-
DEPARTMENT OF DEFENSE STANDARD. Epartment of defense trusted computer system evaluation criteria. DoD 5200.28-STD, Dec 1998.
-
(1998)
DoD 5200.28-STD
-
-
-
5
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh. Terra: a virtual machine-based platform for trusted computing. In Proceedings of the ACM Symposium on Operating Systems Principles, pages 193-206, 2003.
-
(2003)
Proceedings of the ACM Symposium on Operating Systems Principles
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
6
-
-
33750248123
-
Leendert van Doorn. Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor
-
Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ramon Caceres, Ronald Perez, Stefan Berger, John Linwood Griffin, Leendert van Doorn. Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor. In Annual Computer Security Application Conference, pages 276-285, 2005.
-
(2005)
Annual Computer Security Application Conference
, pp. 276-285
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Caceres, R.4
Perez, R.5
Berger, S.6
Linwood Griffin, J.7
-
7
-
-
70449500402
-
-
VMware. http://www.vmware.com/.
-
VMware
-
-
-
8
-
-
21644433634
-
Xen and the art of virtualization
-
New York, NY, USA, ACM
-
Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, and Andrew Warfield. Xen and the art of virtualization. In SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, pages 164-177, New York, NY, USA, 2003. ACM.
-
(2003)
SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
9
-
-
77952329878
-
Improving Xen security through disaggregation
-
New York, NY, USA, ACM
-
Derek Gordon Murray, Grzegorz Milos, and Steven Hand. Improving Xen security through disaggregation. In VEE '08: Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, pages 151-160, New York, NY, USA, 2008. ACM.
-
(2008)
VEE '08: Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments
, pp. 151-160
-
-
Gordon Murray, D.1
Milos, G.2
Hand, S.3
-
10
-
-
70449464049
-
-
VMware. VMware ESX Server Virtual Infrastructure Node Evaluators Guide, 2005. http://www.vmware.com/pdf/esx vin eval.pdf.
-
VMware. VMware ESX Server Virtual Infrastructure Node Evaluators Guide, 2005. http://www.vmware.com/pdf/esx vin eval.pdf.
-
-
-
-
11
-
-
34748842601
-
Reducing TCB complexity for security-sensitive applications: Three case studies
-
New York, NY, USA, ACM
-
Lenin Singaravelu, Calton Pu, Hermann Härtig, and Christian Helmuth. Reducing TCB complexity for security-sensitive applications: three case studies. In EuroSys '06: Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006, pages 161-174, New York, NY, USA, 2006. ACM.
-
(2006)
EuroSys '06: Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems
, pp. 161-174
-
-
Singaravelu, L.1
Pu, C.2
Härtig, H.3
Helmuth, C.4
-
12
-
-
41149103393
-
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
New York, NY, USA, ACM
-
Arvind Seshadri, Mark Luk, Ning Qu, and Adrian Perrig. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In SOSP '07: Proceedings of twenty-first ACMSIGOPS symposium on Operating systems principles, pages 335-350, New York, NY, USA, 2007. ACM.
-
(2007)
SOSP '07: Proceedings of twenty-first ACMSIGOPS symposium on Operating systems principles
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
13
-
-
70449501898
-
Towards Virtual Passthrough I/O on Commodity Devices
-
Muli Ben-Yehuda, Alan L. Cox, and Scott Rixner, editors, USENIX Association
-
Lei Xia, Jack Lange, and Peter A. Dinda. Towards Virtual Passthrough I/O on Commodity Devices. In Muli Ben-Yehuda, Alan L. Cox, and Scott Rixner, editors, Workshop on I/O Virtualization. USENIX Association, 2008.
-
(2008)
Workshop on I/O Virtualization
-
-
Xia, L.1
Lange, J.2
Dinda, P.A.3
-
14
-
-
67650079952
-
BitVisor: A Thin Hypervisor for Enforcing I/O Device Security
-
March
-
Takahiro Shinagawa, Hideki Eiraku, Kouichi Tanimoto, Kazumasa Omote, Shoichi Hasegawa, Takashi Horie, Manabu Hirano, Kenichi Kourai, Yoshihiro Oyama, Eiji Kawai, Kenji Kono, Shigeru Chiba, Yasushi Shinjo, and Kazuhiko Kato. BitVisor: A Thin Hypervisor for Enforcing I/O Device Security. In Proc. the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, March 2009.
-
(2009)
Proc. the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments
-
-
Shinagawa, T.1
Eiraku, H.2
Tanimoto, K.3
Omote, K.4
Hasegawa, S.5
Horie, T.6
Hirano, M.7
Kourai, K.8
Oyama, Y.9
Kawai, E.10
Kono, K.11
Chiba, S.12
Shinjo, Y.13
Kato, K.14
-
15
-
-
67049174120
-
Design and Implementation of a Portable IDManagement Framework for a Secure Virtual Machine Monitor
-
Dynamic Publishers
-
Manabu Hirano, Takeshi Okuda, Eiji Kawai and Suguru Yamaguchi. Design and Implementation of a Portable IDManagement Framework for a Secure Virtual Machine Monitor. Journal of Information Assurance and Security (JIAS), Dynamic Publishers, 2:211-216, 2007.
-
(2007)
Journal of Information Assurance and Security (JIAS)
, vol.2
, pp. 211-216
-
-
Hirano, M.1
Okuda, T.2
Kawai, E.3
Yamaguchi, S.4
-
16
-
-
67049173187
-
Introducing Role-based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers
-
Dec
-
Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Koichi Tanimoto, Takashi Horie, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, and Suguru Yamaguchi. Introducing Role-based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers. In Proc. the IEEE International Workshop on Dependable and Secure Services Computing 2008, Dec. 2008.
-
(2008)
Proc. the IEEE International Workshop on Dependable and Secure Services Computing 2008
-
-
Hirano, M.1
Shinagawa, T.2
Eiraku, H.3
Hasegawa, S.4
Omote, K.5
Tanimoto, K.6
Horie, T.7
Kato, K.8
Okuda, T.9
Kawai, E.10
Yamaguchi, S.11
-
20
-
-
70449471928
-
-
RSA Laboratories. PKCS #11: Cryptographic Token Interface Standard v2.20, 2001.
-
RSA Laboratories. PKCS #11: Cryptographic Token Interface Standard v2.20, 2001.
-
-
-
-
21
-
-
70449480066
-
-
PC/SC Workgroup. PC/SC Workgroup Specifications 2.01.5, 2008.
-
PC/SC Workgroup. PC/SC Workgroup Specifications 2.01.5, 2008.
-
-
-
|