期刊文献+

战术环境下的虚拟化安全增强方法

Enhancement of Virtualization Security in Tactical Environment
下载PDF
导出
摘要 在数据中心中,虚拟化的价值已经被大家所公认,但是在战术环境中,虚拟化能否发挥同样的作用呢?答案是肯定的,但是前提是保证它的安全。在战术环境中,虚拟机管理器更容易受到攻击,如果虚拟机管理器和虚拟机之间无法隔离的话,一旦虚拟机管理器被攻击者控制,那么虚拟机也会被控制。本文阐述了虚拟化在战术环境中的优势,同时利用强制访问控制策略保障战术环境中的虚拟化安全。由此实现虚拟化在战术环境下的实际使用。 Virtualization proves to be valuable in the data center,but could it work in tactical environments? Yes,only if it's secure. In tactical environment,virtual machine manager is fairly vulnerable to attacking. If the isolation of between the virtual machine manager and virtual machine could not be ensured,and once the virtual machine manager is controlled by an attacker,the virtual machine would be easily controlled. Advantages of virtualization in tactical environment are described in this paper. In addition,mandatory access control policies are applied to protecting the virtualization security in tactical environment,thus to realize practical application of virtualization in tactical environment.
出处 《信息安全与通信保密》 2016年第4期113-116,共4页 Information Security and Communications Privacy
关键词 战术环境 虚拟化 虚拟机隔离 tactical environment virtualization virtual machine isolation
  • 相关文献

参考文献5

  • 1Loscocco P A, Smalley S D, Muckelbauer P A, et al. The inev- itability of failure : The flawed assumption of security in modem computing environments[ C ]//Proceedings of the 21st National Information Systems Security Conference. 1998,10 : 303-314.
  • 2Gregory M, Loscocco P. Using the flask security architecture to facilitate risk adaptable access controls [ C ]//Third Annual Security Enhanced Linux Symposium. 2007.
  • 3Peter Loscocco N S A. Integrating flexible support for security policies into the Linux operating system [ C ]//Proceedings of the FREENIX Track: ... USENIX Annual Technical Confer- ence. The Association, 2001: 29.
  • 4Walsh E. Application of the flask architecture to the x window system server[ C]//Proceedings of the 2007 SELinux Symposi- um. 2007 : 1-8.
  • 5Spencer R, Smalley S, Loscocco P, et al. The Flask security architecture: System support for diverse policies [C ]//Pro- ceedings of the Eighth USENIX Security Symposium. 1999.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部