期刊文献+

基于虚拟化技术的信息系统安全防护框架研究 被引量:9

Research on Information System Security Protection Framework Based on Virtualization Technology
下载PDF
导出
摘要 关键信息系统的安全防护问题一直以来都是研究热点。围绕数据安全和恶意代码攻击等关键安全问题,以虚拟机监视器作为安全防护立足点,充分利用虚拟机监视器的拦截、隔离、I/O数据加解密等机制,构建了一种新的信息系统安全防护构架,详细阐述了安全防护框架的工作原理以及典型安全服务的构建方法。 Security protection of critical information systems has been a hot research topic for several years. This paper analyzes the key security problems like data security and malicious code attack, and proposes a new information system security protection framework based on virtual machine monitors. The mechanism of interception, isolation and I/O encryption and decryption of virtual machine monitors is exploited. The working principles of this framework and the methods for the construction of classical security services are illustrated in detail.
作者 陈昊 徐建
出处 《电力信息化》 2011年第6期14-18,共5页 Electric Power Information Technology
基金 高等学校博士学科点专项科研基金项目(20093219120024)
关键词 虚拟化技术 虚拟机 安全防护 virtualization technology virtual machine security protection
  • 相关文献

参考文献1

二级参考文献13

  • 1Goldberg R P. Architectural principles for virtual computer systems[D]. Harvard University, 1972.
  • 2Buzen J P, Gagliardi U O. The evolution of virtual machine arehiteeture[C]//Proceedings of the National Computer Conference and Exposition (AFIPS' 73), June 4-8, 1973. New York, NY, USA: ACM Press, 1973:291-299.
  • 3Attanasio C R. Virtual machines and data security[C]//Proeeedings of the Workshop on Virtual Computer Systems. New York, NY, USA: ACM Press, 1973:206-209.
  • 4Casarosa V, Paoil C. Vhm: A virtual hardware monitor[C]//Proceedings of the Workshop on Virtual Computer Systems. New York, NY, USA: ACM Press, 1973:150-169.
  • 5Goldberg R P. Architecture of virtual machines [C]//Proceedings of the National Computer Conference and Exposition (AFIPS'73), June 4-8, 1973. New York, NY, USA: ACM Press, 1973 : 309-318.
  • 6Smith J E, Nair R. The architecture of virtual machines [J]. Computer, 2005,38(5) : 32-38.
  • 7Rosenblum M, Garfinkel T. Virtual machine monitors: Current technology and future trends[J]. Computer, 2005,38 (5) : 39-47.
  • 8Rose R. Survey of system virtualization techniques[C]//Proc of the 3rd Int'l Conf on Parallel Processing and Applied Mathematics, 2004.
  • 9Arnold M, Fink S J, Grove D, et al. A survey of adaptive optimization in virtual machines[CJ//Proceedings of the IEEE, 2005,93 : 449-466.
  • 10Barham P, Dragovic B, Fraser K, et al. Xen and the art of virtualization[C]//Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP' 03). New York, NY, USA: ACM Press, 2003:164-177.

共引文献4

同被引文献25

引证文献9

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部