This paper is a continuation of our last paper [1] which describes the theory of Virt-BLP model. Based on Virt-BLP model,this paper implements a mandatory access control(MAC) framework applicable to multi-level securi...This paper is a continuation of our last paper [1] which describes the theory of Virt-BLP model. Based on Virt-BLP model,this paper implements a mandatory access control(MAC) framework applicable to multi-level security(MLS) in Xen. The Virt-BLP model is the theoretical basis of this MAC framework,and this MAC framework is the implementation of Virt-BLP model. Our last paper focuses on Virt-BLP model,while this paper concentrates on the design and implementation of MAC framework. For there is no MAC framework applicable to MLS in virtual machine system at present,our MAC framework fills the blank by applying Virt-BLP model to Xen,which is better than current researches to guarantee the security of communication between virtual machines(VMs) . The experimental results show that our MAC framework is effective to manage the communication between VMs.展开更多
The level set method, TVD scheme of second order upwind procedure coupled with flux limiter, ENO velocity extension procedure inside the huhble, and MAC projection algorithm were incorporated to simulate the whole col...The level set method, TVD scheme of second order upwind procedure coupled with flux limiter, ENO velocity extension procedure inside the huhble, and MAC projection algorithm were incorporated to simulate the whole collapse e volution of a cavitation bubble near a rigid wall with many complicated phenomena, such as topology distortion and shrinking, jet impact, bubble breaking into a toroidal form, and diminishing volume to zero, etc. The huhhle shape, evolution and distribution of velocity and pressure fields of the fluid during the bubble collapsing were investigated. It is found that the method is numerically stable and has good convergence property, and the results are in good agreements with those in previous work.展开更多
基金supported by National Key Basic Research and Development Plan (973 Plan) of China (No. 2007CB310900)National Natural Science Foundation of China (No. 90612018, 90715030 and 60970008)
文摘This paper is a continuation of our last paper [1] which describes the theory of Virt-BLP model. Based on Virt-BLP model,this paper implements a mandatory access control(MAC) framework applicable to multi-level security(MLS) in Xen. The Virt-BLP model is the theoretical basis of this MAC framework,and this MAC framework is the implementation of Virt-BLP model. Our last paper focuses on Virt-BLP model,while this paper concentrates on the design and implementation of MAC framework. For there is no MAC framework applicable to MLS in virtual machine system at present,our MAC framework fills the blank by applying Virt-BLP model to Xen,which is better than current researches to guarantee the security of communication between virtual machines(VMs) . The experimental results show that our MAC framework is effective to manage the communication between VMs.
文摘The level set method, TVD scheme of second order upwind procedure coupled with flux limiter, ENO velocity extension procedure inside the huhble, and MAC projection algorithm were incorporated to simulate the whole collapse e volution of a cavitation bubble near a rigid wall with many complicated phenomena, such as topology distortion and shrinking, jet impact, bubble breaking into a toroidal form, and diminishing volume to zero, etc. The huhhle shape, evolution and distribution of velocity and pressure fields of the fluid during the bubble collapsing were investigated. It is found that the method is numerically stable and has good convergence property, and the results are in good agreements with those in previous work.