Building a mac-based security architecture for the Xen open-source hypervisor
Download 220.31 Kb. Pdf ko'rish
|
Building a MAC based security architecture for the Xen open source
Security and Privacy, 1991.
[22] J. Liedtke. On µ-kernel construction. Proceedings of the 15 t h Symposium on Operating System Principles, 1995. [23] S. E. Madnick and J. J. Donovan. Application and analysis of the virtual machine approach to information system se- curity and isolation. Proceedings of the ACM workshop on virtual computer systems, 1973. [24] E. J. McCauley and P. J. Drongowski. KSOS – The design of a secure operating system. In Proc. In AFIPS Conference, pages 345–353, 1979. [25] R. Meushaw and D. Simard. NetTop - Commercial Technol- ogy in High Assurance Applications. Tech Trend Notes, Fall 2000. [26] National Security Agency. Security-Enhanced Linux (SELinux). http://www.nsa.gov/selinux. [27] J. Rushby. Proof of Separability—A verification technique for a class of security kernels. In Proc. 5th International Symposium on Programming, volume 137 of Lecture Notes in Computer Science, pages 352–367, Turin, Italy, 1982. Springer-Verlag. [28] R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and Implementation of a TCG-based Integrity Measurement Architecture. In Thirteenth USENIX Security Symposium, pages 223–238, August 2004. [29] R. R. Schell, T. F. Tao, and M. Heckman. Designing the GEMSOS Security Kernel for Security and Performance. 8th National Computer Security Conference, pages 108– 119, 1985. [30] H. Scherzer, R. Canetti, P. A. Karger, H. Krawczyk, T. Ra- bin, and D. C. Toll. Authenticating Mandatory Access Con- trols and Preserving Privacy for a High-Assurance Smart Card. In (ESORICS), 2003. [31] J. Shapiro, J. Smith, and D. Farber. EROS: A fast capability system. Proceedings of the 17 t h Symposium on Operating System Principles, 1999. [32] W. R. Shockley, T. F. Tao, and M. F. Thompson. An Overview of the GEMSOS Class A1 Technology and Appli- cation Experience. 11th National Computer Security Con- ference, pages 238–245, October 1988. [33] R. Spencer, P. Loscocco, S. Smalley, M. Hibler, D. Ander- son, and J. Lepreau. The Flask Security Architecture: Sys- tem support for diverse security policies. In Proceedings of The Eighth USENIX Security Symposium, August 1999. [34] VMware. http://www.vmware.com/. [35] XenSource. http://xenbits.xensource.com/xen-unstable.hg. 10 Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005) 1063-9527/05 $20.00 © 2005 IEEE Authorized licensed use limited to: Tashkent University of Information Technologies. Downloaded on April 06,2023 at 09:07:42 UTC from IEEE Xplore. Restrictions apply. Download 220.31 Kb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling