期刊文献+

A Mandatory Access Control Framework in Virtual Machine System with Respect to Multi-level Security Ⅱ:Implementation 被引量:5

一种虚拟机系统下关于多级安全的强制访问控制框架Ⅱ:实现(英文)
在线阅读 下载PDF
导出
摘要 This paper is a continuation of our last paper [1] which describes the theory of Virt-BLP model. Based on Virt-BLP model,this paper implements a mandatory access control(MAC) framework applicable to multi-level security(MLS) in Xen. The Virt-BLP model is the theoretical basis of this MAC framework,and this MAC framework is the implementation of Virt-BLP model. Our last paper focuses on Virt-BLP model,while this paper concentrates on the design and implementation of MAC framework. For there is no MAC framework applicable to MLS in virtual machine system at present,our MAC framework fills the blank by applying Virt-BLP model to Xen,which is better than current researches to guarantee the security of communication between virtual machines(VMs) . The experimental results show that our MAC framework is effective to manage the communication between VMs. This paper is a continuation of our last paper [1] which describes the theory of Virt-BLP model. Based on Virt-BLP model,this paper implements a mandatory access control(MAC) framework applicable to multi-level security(MLS) in Xen. The Virt-BLP model is the theoretical basis of this MAC framework,and this MAC framework is the implementation of Virt-BLP model. Our last paper focuses on Virt-BLP model,while this paper concentrates on the design and implementation of MAC framework. For there is no MAC framework applicable to MLS in virtual machine system at present,our MAC framework fills the blank by applying Virt-BLP model to Xen,which is better than current researches to guarantee the security of communication between virtual machines(VMs) . The experimental results show that our MAC framework is effective to manage the communication between VMs.
出处 《China Communications》 SCIE CSCD 2011年第2期86-94,共9页 中国通信(英文版)
基金 supported by National Key Basic Research and Development Plan (973 Plan) of China (No. 2007CB310900) National Natural Science Foundation of China (No. 90612018, 90715030 and 60970008)
关键词 virt-BLP model MAC framework multi-level security XEN virt-BLP model MAC framework multi-level security Xen
  • 相关文献

参考文献8

  • 1刘谦,王观海,翁楚良,骆源,李明禄.一种虚拟机系统中关于多级安全的强制访问控制框架Ⅰ:理论(英文)[J]中国通信,2010(04).
  • 2LITTY L,LIE D.Manitou: A LayerBelow Approach to Fighting Malware. Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability . 2006
  • 3HIRANO M,SHINAGAWA T,EIRAKU H, et al.Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers. Proceedings of IEEE Asia-Pacific Services Computing Conference . 2008
  • 4COKER G.Xen Security Modules (XSM). http://www.xen.org/fi les/xensummit_4/xsm- summit-041707_Coker.pdf . 2010
  • 5Dunlap G W,King S T,Sukru C et al.ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay. Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI’02) . 2002
  • 6Reiner Sailer,Trent Jaeger,Enriquillo Valdez,Ramon Caceres,Ronald Perez,Stefan Berger,John Linwood Griffin,Leendert van Doorn.Building a mac-based securityarchitecture for the xen open-source hypervisor. Proceedings of the 2005 Annual Computer Security Applications Conference . 2005
  • 7Barham P,Dragovic B,Fraser K,et al.Xen and the Art of Virtualization. Proceedings of the 19th ACM Symposium on Operating Systems Principles . 2003
  • 8McLean J.The specification and modeling of computer security. Computer . 1990

同被引文献64

  • 1Brickell E F, Hall C D, Cihula J F, et al. Method of improv- ing computer security through sandboxing [P]. US: 7908653, 2011-03-15.
  • 2Ashok R K, Jemiolo D E, Kaplinger T E, et al. Secure ac- cess to a virtual machine [P]. US: 13/420, 102, 2012-03-14.
  • 3Tupakula U, Varadharajan V, Bichhawat A. Security archi- tecture for virtual machines [C]//Proc 1 lth Algorithms and architectures for parallel processing. Berlin, Heidelberg: Springer-Verlag, 2011 : 218-229.
  • 4Garber L. The challenges of securing the virtualized envi- ronment [J]. Computer, 2012, 45(1): 17-20.
  • 5Haeberlen A, Aditya P, Rodrigues R, et al. Accountable virtual machines [C]//Proc 9th USENIX Operating systems design and implementation. New York: USENIX Associa- tion, 2010: 58-74.
  • 6Kunk A, Bohman P, Shaw E. VMM based rootkit detection on Android[EB/OL]. [2011-05-10]. http://cs523-sp2011-bjks. googlecode.com/files/cs5 23 final_report.pdf.
  • 7Borghei E, Azmi R, Ghahremanian A, et al. Virtual machine based security architecture [C]//Proe World Congress on In- ternet Security. London: IEEE Press, 2011 : 210- 215.
  • 8Nan Z. Virtualization safety problem analysis [C]//Proc 3rd Communication Software and Networks. Xi'an: IEEE Press, 2011: 195-197.
  • 9Semnanian A A, Pham J, Englert B, et al. Virtualization technology and its impact on computer hardware architec- ture [C]//Proc Eighth International Conference on Informa- tion Technology: New Generations. Las Vegas: IEEE Press, 2011: 719-724.
  • 10Amsden Z, Arai D, Hecht D, et al. Virtual machine interface (vmi) specifications [EB/OL]. [2013-05-02]. http://www. vmware, com/pdf/vmi_specs.pdf.

引证文献5

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部