메뉴 건너뛰기




Volumn , Issue , 2000, Pages

Analysis of the intel Pentium's ability to support a secure virtual machine monitor

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMS; COMMERCIAL OFF-THE-SHELF; NETWORK SECURITY; VIRTUAL MACHINE;

EID: 85084161596     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (151)

References (37)
  • 1
    • 85077688694 scopus 로고    scopus 로고
    • ISO/IEC 15408 - Common criteria for information technology security evaluation
    • May
    • ISO/IEC 15408 - Common Criteria for Information Technology Security Evaluation. Technical Report CCIB-98-026, May 1998.
    • (1998) Technical Report CCIB-98-026
  • 3
    • 0033903324 scopus 로고    scopus 로고
    • Welcome to the opportunities of binary translation
    • March
    • E. R. Altman, D. Kaeli, and Y. Sheffer. Welcome to the Opportunities of Binary Translation. IEEE Computer, 33(3):40-45, March 2000.
    • (2000) IEEE Computer , vol.33 , Issue.3 , pp. 40-45
    • Altman, E.R.1    Kaeli, D.2    Sheffer, Y.3
  • 4
    • 0004200684 scopus 로고
    • Computer security technology planning study
    • Hanscom AFB, Bedford, MA Also available as DITCAD-758206 DITCAD-772806
    • J. P. Anderson. Computer Security Technology Planning Study. Technical Report ESD-TR-73-51, Air Force Electronic Systems Division, Hanscom AFB, Bedford, MA, 1972. (Also available as Vol. I, DITCAD-758206. Vol. II, DITCAD-772806).
    • (1972) Technical Report ESD-TR-73-51, Air Force Electronic Systems Division , vol.1-2
    • Anderson, J.P.1
  • 5
    • 0016873760 scopus 로고
    • Penetrating an operating system: A study of VM/370 integrity
    • C. Attanasio, P. Markenstein, and R. J. Phillips. Penetrating an Operating System: a Study of VM/370 Integrity. IBM Systems Journal, 15(1):102-116, 1976.
    • (1976) IBM Systems Journal , vol.15 , Issue.1 , pp. 102-116
    • Attanasio, C.1    Markenstein, P.2    Phillips, R.J.3
  • 6
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations and model
    • MITRE Corp., Bedford, MA
    • D. E. Bell and L. LaPadula. Secure Computer Systems: Mathematical Foundations and Model. Technical Report M74-244, MITRE Corp., Bedford, MA, 1973.
    • (1973) Technical Report M74-244
    • Bell, D.E.1    LaPadula, L.2
  • 7
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • MITRE Corp.
    • K. J. Biba. Integrity Considerations for Secure Computer Systems. Technical Report ESD-TR-76-372, MITRE Corp., 1977.
    • (1977) Technical Report ESD-TR-76-372
    • Biba, K.J.1
  • 8
    • 0031269854 scopus 로고    scopus 로고
    • Disco: Running commodity operating systems on scaleable multiprocessors
    • November
    • E. Bugnion, S. Devine, K. Govil, and M. Rosenblum. Disco: Running Commodity Operating Systems on Scaleable Multiprocessors. ACM Transactions on Computer Systems, 15(4):412-447, November 1997.
    • (1997) ACM Transactions on Computer Systems , vol.15 , Issue.4 , pp. 412-447
    • Bugnion, E.1    Devine, S.2    Govil, K.3    Rosenblum, M.4
  • 19
    • 85077711761 scopus 로고    scopus 로고
    • July
    • K. Lawton. http://www.bochs.com, July 1999.
    • (1999)
    • Lawton, K.1
  • 21
    • 84879848814 scopus 로고
    • Application and analysis of the virtual Machine approach to information system security
    • Boston, MA, March A.C.M.
    • S. E. Madnick and J. J. Donavan. Application and Analysis of the Virtual Machine Approach to Information System Security. In ACM SIGARCH-SYSOPS Workshop on Virtual Computer Systems, pages 210-224, Boston, MA, March 1973. A.C.M.
    • (1973) ACM SIGARCH-SYSOPS Workshop on Virtual Computer Systems , pp. 210-224
    • Madnick, S.E.1    Donavan, J.J.2
  • 24
    • 15944378656 scopus 로고
    • CSC-EPL-92/003 C-Evaluation No. 21-92, 27 May
    • National Computer Security Center. Final Evaluation Report of HFSIXTS-200, CSC-EPL-92/003 C-Evaluation No. 21-92, 27 May 1992.
    • (1992) Final Evaluation Report of HFSIXTS-200
  • 28
    • 0016082273 scopus 로고
    • Formal requirements for virtualizable 3rd generation architectures
    • G. Popek and R. Goldberg. Formal Requirements for Virtualizable 3rd Generation Architectures. Communications of the A.C.M., 17(7):412-421, 1974.
    • (1974) Communications of the A.C.M. , vol.17 , Issue.7 , pp. 412-421
    • Popek, G.1    Goldberg, R.2
  • 32
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • J. H. Saltzer and M. D. Schroeder. The Protection of Information in Computer Systems. Proceedings of the IEEE, 63(9):1278-1308, 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 33
    • 84958951541 scopus 로고
    • Program confinement in KVM/370
    • Seattle, WA, October A.C.M.
    • M. Schaefer and B. Gold. Program Confinement in KVM/370. In Proceedings 1977 Annual Conference, pages 404-410, Seattle, WA, October 1977. A.C.M.
    • (1977) Proceedings 1977 Annual Conference , pp. 404-410
    • Schaefer, M.1    Gold, B.2
  • 34
    • 0015315880 scopus 로고
    • A hardware architecture for implementing protection rings
    • M. D. Schroeder and J. H. Saltzer. A Hardware Architecture for Implementing Protection Rings. Comm. A.C.M., 15(3):157-170, 1972.
    • (1972) Comm. A.C.M. , vol.15 , Issue.3 , pp. 157-170
    • Schroeder, M.D.1    Saltzer, J.H.2
  • 35
    • 0029210672 scopus 로고
    • The intel 80 × 86 processor architecture: Pitfalls for secure systems
    • Oakland, CA, May IEEE Computer Society Press
    • O. Sibert, P. A. Porras, and R. Lindell. The Intel 80 × 86 Processor Architecture: Pitfalls for Secure Systems. In Proceedings 1995 IEEE Symposium on Security and Privacy, pages 211-222, Oakland, CA, May 1995. IEEE Computer Society Press.
    • (1995) Proceedings 1995 IEEE Symposium on Security and Privacy , pp. 211-222
    • Sibert, O.1    Porras, P.A.2    Lindell, R.3
  • 37
    • 85077724019 scopus 로고    scopus 로고
    • June
    • Wine. http://www.winehq.com, June 2000.
    • (2000)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.