메뉴 건너뛰기




Volumn , Issue , 2008, Pages 151-160

Improving Xen security through disaggregation

Author keywords

Disaggregation; Trusted computing base; Virtual machines

Indexed keywords

DISAGGREGATION; HYPERVISOR; OPERATING SYSTEMS; SECURITY ANALYSIS; TRUSTED COMPUTING; TRUSTED COMPUTING BASE; VIRTUAL MACHINE MONITORS; VIRTUAL MACHINES; VIRTUALISATION;

EID: 77952329878     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1346256.1346278     Document Type: Conference Paper
Times cited : (169)

References (36)
  • 1
    • 77952367894 scopus 로고    scopus 로고
    • DICE user's manual
    • R. Aigner. DICE User's Manual. Technical report, Technische Universität Dresden, 2007. http://os.inf.tu-dresden.de/ dice/manual.pdf.
    • (2007) Technical Report
    • Aigner, R.1
  • 2
    • 54249153664 scopus 로고    scopus 로고
    • Towards trustworthy virtualisation environments: Xen library os security service infrastructure
    • Hewlett-Packard Development Company, L.P., April
    • M. J. Anderson, M. Moffie, and C. I. Dalton. Towards Trustworthy Virtualisation Environments: Xen Library OS Security Service Infrastructure. Technical Report HPL-2007-2069, Hewlett-Packard Development Company, L.P., April 2007.
    • (2007) Technical Report HPL-2007-2069
    • Anderson, M.J.1    Moffie, M.2    Dalton, C.I.3
  • 5
    • 0021122553 scopus 로고
    • Software errors and complexity: An empirical investigation
    • V. R. Basili and B. T. Perricone. Software errors and complexity: an empirical investigation. Commun. ACM, 27(1):42-52, 1984.
    • (1984) Commun. ACM , vol.27 , Issue.1 , pp. 42-52
    • Basili, V.R.1    Perricone, B.T.2
  • 9
    • 0030092390 scopus 로고    scopus 로고
    • Checking for race conditions in file accesses
    • Spring
    • M. Bishop and M. Dilger. Checking for race conditions in file accesses. Computing Systems, 9(2):131-152, Spring 1996.
    • (1996) Computing Systems , vol.9 , Issue.2 , pp. 131-152
    • Bishop, M.1    Dilger, M.2
  • 20
    • 38049026664 scopus 로고    scopus 로고
    • An Open Trusted Computing Architecture: Secure virtual machines enabling user-defined policy enforcement
    • D. Kuhlmann, R. Landfermann, H. Ramasamy, M. Schunter, G. Ramunno, and D. Vernizzi. An Open Trusted Computing Architecture: Secure virtual machines enabling user-defined policy enforcement. Technical report, OpenTC consortium, 2006. https://secure.opentc.net/otc-HighLevelOverview/OTC-Architecture.High- level.overview.pdf.
    • (2006) Technical Report, OpenTC Consortium
    • Kuhlmann, D.1    Landfermann, R.2    Ramasamy, H.3    Schunter, M.4    Ramunno, G.5    Vernizzi, D.6
  • 22
    • 77952329706 scopus 로고    scopus 로고
    • Microsoft Corporation. BitLocker Drive Encryption, 2007. http : //technet.microsoft.com/en-us/windowsvista/aa905065. aspx.
    • (2007) BitLocker Drive Encryption
  • 23
    • 0038562418 scopus 로고
    • Technical Report 800-812, National Institute of Standards and Technology. National Institute of Standards and Technology, October
    • National Institute of Standards and Technology. An Introduction to Computer Security: the NIST Handbook. Technical Report 800-812, National Institute of Standards and Technology, October 1995.
    • (1995) An Introduction to Computer Security: The NIST Handbook
  • 24
    • 0036986569 scopus 로고    scopus 로고
    • The distribution of faults in a large industrial software system
    • T. J. Ostrand and E. J. Weyuker. The distribution of faults in a large industrial software system. SIGSOFT Softw. Eng. Notes, 27(4):55-64, 2002.
    • (2002) SIGSOFT Softw. Eng. Notes , vol.27 , Issue.4 , pp. 55-64
    • Ostrand, T.J.1    Weyuker, E.J.2
  • 31
    • 33646895419 scopus 로고    scopus 로고
    • Can we make operating systems reliable and secure?
    • A. Tanenbaum, J. Herder, and H. Bos. Can we make operating systems reliable and secure? Computer, 39(5):44-51, 2006.
    • (2006) Computer , vol.39 , Issue.5 , pp. 44-51
    • Tanenbaum, A.1    Herder, J.2    Bos, H.3
  • 33
    • 70749096362 scopus 로고    scopus 로고
    • Technical Report (Unattributed)
    • (Unattributed). TPM Main Part 1 Design Principles. Technical report, Trusted Computing Group, 2007. https://www. trustedcomputinggroup.org/specs/TPM/ mainP1DPrev103. zip.
    • (2007) TPM Main Part 1 Design Principles
  • 35
    • 77952336932 scopus 로고    scopus 로고
    • XenSource. XenApi - Xen Wiki, 2007. http://wiki.xensource. com/xenwiki/XenApi.
    • (2007) XenApi - Xen Wiki
  • 36
    • 78650822098 scopus 로고    scopus 로고
    • XenSocket: A high-throughput interdomain transport for VMs
    • Secaucus, NJ, USA, Springer-Verlag New York, Inc.
    • X. Zhang, S. McIntosh, P. Rohatgi, and J. Griffin. XenSocket: A high-throughput interdomain transport for VMs. In Proceedings of Middleware 2007, Secaucus, NJ, USA, 2007. Springer-Verlag New York, Inc.
    • (2007) Proceedings of Middleware 2007
    • Zhang, X.1    McIntosh, S.2    Rohatgi, P.3    Griffin, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.