期刊文献+

XEN Virtual Machine Technology and Its Security Analysis 被引量:4

XEN Virtual Machine Technology and Its Security Analysis
下载PDF
导出
摘要 This paper interprets the essence of XEN and hardware virtualization technology, which make the virtual machine technology become the focus of people's attention again because of its impressive performance. The security challenges of XEN are mainly researched from the pointes of view: security bottleneck, security isolation and share, life-cycle, digital copyright protection, trusted virtual machine and managements, etc. These security problems significantly affect the security of the virtual machine system based on XEN. At the last, these security measures are put forward, which will be a useful instruction on enhancing XEN security in the future. This paper interprets the essence of XEN and hardware virtualization technology, which make the virtual machine technology become the focus of people's attention again because of its impressive performance. The security challenges of XEN are mainly researched from the pointes of view: security bottleneck, security isolation and share, life-cycle, digital copyright protection, trusted virtual machine and managements, etc. These security problems significantly affect the security of the virtual machine system based on XEN. At the last, these security measures are put forward, which will be a useful instruction on enhancing XEN security in the future.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期159-162,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foundation of China (90104005, 60373087, 60473023) and Network and Information Security Key Laboratory Program of Ministry of Education of China
关键词 virtual machine XEN SECURITY virtual machine XEN security
  • 相关文献

参考文献1

二级参考文献27

  • 1Kemmerer RA, Taylor TA. Modular covert channel analysis methodology for trusted DG/UXTM. IEEE Trans. on Software Engineering, Vol. 22, 1996.
  • 2Denning DE. A lattice model of secure information flow. Communications of the ACM, 1976. 236-243.
  • 3He J, Gligor VD. Information flow analysis for covert-channel identification in multilevel secure operating systems. In: Proc. of the 3rd IEEE Workshop on Computer Security Foundations. 1990. 139-148.
  • 4Feiertag R. A technique for proving specifications are multilevel secure. Technical Report CSL-109, 1980.
  • 5Feiertag R, Levitt KN, Robinson L. Proving multilevel security of a system design. In: Proc. of the 6th ACM Symp. on Operating Systems Principles. 1977.57-65.
  • 6Goguen JA, Meseguer J. Security policies and security models. In: Proc. of the IEEE Symp. on Security and Privacy. 1982. 11-20.
  • 7Millen JK. Foundations of covert-channel detection. Technical Report MTR-10538, The M1TRE Corporation, 1989.
  • 8Goguen JA, Meseguer J. Unwinding and inference vontrol. In: Proc. of the IEEE Symp. on Security and Privacy. 1984. 75-86.
  • 9Haigh JT, Kemmerer RA, McHugh J, Young WD. An experience using two covert channel analysis techniques on a real system design. IEEE Trans. on Software Engineering, 1987. 157-168.
  • 10Millen JK. Finite-State noiseless covert channels. In: Proc. of the Computer Security Foundations Workshop. 1989.81-85.

共引文献30

同被引文献18

  • 1屈波,熊前兴,吴业福,李玉强,陶强.基于物理隔离的安全网闸研究与系统设计[J].计算机科学,2004,31(B09):222-225. 被引量:5
  • 2杨少春.采用VMware构建虚拟并行计算网[J].计算机工程与设计,2006,27(14):2546-2547. 被引量:20
  • 3孙世昶,李忠明.XEN虚拟机系统直接I/O访问机制的研究与实现[J].大连民族学院学报,2007,9(3):30-33. 被引量:2
  • 4Waiters J P, Vipin Chaudhary, Minsuk Cha, et ai. A comparison of virtualization technologies for HPC[C]. 22nd International Conference on Advanced Information Networking and Appfications, 2008, 861-868.
  • 5Ludmila Cherkasova, Diwaker Gupta, et al. Comparison of the three CPU schedulers in Xen [ C ]. ACM Sigmetries Performance Evaluation Review, Sep. 2007,42-51.
  • 6Shisnall David. The definitive guide to the Xen hypervisor[ Z]. 2007,11-19.
  • 7CREDIT-Based CPU scheduler[ EBOL]. http://wild, xcnsourcc. com/xenwiki/CrcditSchcdulcr, 2007.
  • 8Xen Interface manual Xen v3.0 for x86. http://www, cl. cam. ac. uk/research/srg/netos/xen/readmes/interface/interface, html [ EB-OL], 2008.
  • 9Amit Sinha, Anantha P Chandrakasan. Energy efficient real-time scheduling[C]. Proceedings of the 2001 IEEE/ACM International Conference on Computer-aided Design, 2001,458-463.
  • 10XEN. Xen sourcecode: sched serif, c[EBOL], http:// Ixr. Xensource, com/Lxr/source/Xen/common/sched_sedf, c, 2007.

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部