期刊文献+

虚拟机与宿主机之间的文件访问控制 被引量:2

HIPS-Technology_based Access Control between Host and Virtual Machine
原文传递
导出
摘要 文中在深入分析Windows环境下VMware Player虚拟机与宿主机之间文件交换机理的基础上,提出采用HIPS技术结合多角色强制访问控制矩阵模型,实现对VMware Player虚拟机安装Windows XP操作系统与宿主机安装Windows XP操作系统之间的可视文件的访问控制,补充和完善了宿主机系统与虚拟机系统之间的安全隔离和封装,为VMware Player虚拟机系统在实际的安全隔离环境中的应用提供了更高的安全保障。 With theoretical analysis on file sharing and transferring between the VMware Player Virtual Machine and host machine under Microsoft Windows XP environment, a Model which integrates HIPS technology with Multiple Roles and mandatory access control matrix is proposed to realize the visible-file access-control between the VMware Player and the Host Machine, both of which use Microsoft Windows XP as their OS. The solution mentioned above also provides the supplement and improvement for VMware Player s encapsul...
出处 《信息安全与通信保密》 2010年第1期109-112,共4页 Information Security and Communications Privacy
关键词 HIPS技术 虚拟机技术 访问控制 HIPS technology virtual machine technology access-control
  • 相关文献

参考文献13

  • 1Christopher Strachey. Time Sharing in Large, Fast Computers Information Processing: Proceedings of the International Conference on Information Processing[C]. Paris: UNESCO, 1959: 01-29.
  • 2金海,廖小飞.面向计算系统的虚拟化技术[J].中国基础科学,2008,10(6):12-18. 被引量:25
  • 3VMware Corporation. Understanding Full Virtualization, Paravirtualization, and Hardware Assist, White Paper[EB/OL]. ( 2007-11-10)[2009-08-13]. http: //www.vmware.com/files/pdf/VMware_ paravirtualization.pdf.
  • 4Gil Neiger, Amy Santony, Felix Leung, et al. Intel Virtualization Technology. Hardware Support for Efficient Processor Virtualization[J]. Intel Technology Journal, 2006, 08 (03): 167-178.
  • 5Lawton KP. Running Multiple Operating Systems Concurrently on An IA32 PC UsinK Virtualization Techniques[EB/OL]. (1999-11-29)[2009-08-13]. http: //denali.cs.washinglon.edu/relwork/papers/ plex86.txt.
  • 6苏航,吴庆波,李永.基于虚拟机技术的安全系统研究[J].计算机安全,2008(3):49-52. 被引量:4
  • 7VMware Corporation. Workstation User's Manual Workstation 6.5[EB/OL]. (2009-08-20)[2009-08-29]. http: //www.vmwa re.com/pdf/ws65_manual.pdf.
  • 8Matt Bishop.计算机安全学-安全的艺术与科学[M].北京:电子工业出版社,2005.
  • 9韦科,范磊,李建华.基于角色的文件保护模型及其实现[J].信息安全与通信保密,2008,30(5):53-56. 被引量:3
  • 10袁皓,杨晓懿.信息安全模型安全控制研究[J].信息安全与通信保密,2007,29(2):78-80. 被引量:6

二级参考文献27

  • 1王宇,吴忠望,卢昱.信息网络安全控制[J].计算机工程与设计,2005,26(12):3183-3186. 被引量:14
  • 2[1]Walker K M.Confining Root Programs with Domain and Type Enforcement.6th USENIX Security Symposium,August 1996
  • 3[2]Wright C.Linux Security Modules General Security Support for the Linux Kernel.In:USENIX Security Symposium,Sanfancisco,CA,August 2002
  • 4[5]Bovet D P,Cesati M.深入理解Linux内核.中国电力出版社,2001
  • 5[4]ISO/IEC JTC 1/SC27 N2401.Information technology-Security techniques.Secretariat:DIN,Germany.
  • 6[5]David E.Bell and Leonard J.LaPadula.Secure Computer Systems Mathematical Foundations.ESD-TR-73-278,Vol.Ⅰ,AD 770 768,Electronic Systems Division,Air Force Systems Command,Hanscom Air Force Base,Bedford,MA,USA,1973.
  • 7[6]David E.Bell and Leonard J.LaPadula.Secure Computer Systems:A Mathematical Model.ESD-TR-73-278,Vol.Ⅱ,AD 771 543,Electronic Systems Division,Air Force Systems Command,Hanscom Air Force Base,Bedford,MA,USA,1973.
  • 8[9]Security Architecture,Standards and Guidelines by Nebraska Information Technology Commission http://www.nitc.state.ne.us/standards/
  • 9[10]Butler W.Lampson.A Note on the Confinement Problem.Communications of the ACM,1973,16(10):613-615.
  • 10[1]Sandhu R S,Coyne E J,Feinstein H Lt et al.Role_based Access Control Models[J].IEEE Computer,1996,29(2):38-47.

共引文献37

同被引文献10

引证文献2

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部