PIGA-Virt: An Advanced Distributed MAC Protection of Virtual Systems
暂无分享,去创建一个
[1] Trent Jaeger,et al. Outlook: Cloudy with a Chance of Security Challenges and Improvements , 2010, IEEE Security & Privacy.
[2] Jérémy Briffaut,et al. Enforcement of Security Properties for Dynamic MAC Policies , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.
[3] Trent Jaeger,et al. Analysis of virtual machine system policies , 2009, SACMAT '09.
[4] Yoshiyasu Takefuji,et al. A Real-time Integrity Monitor for Xen Virtual Machine , 2006, International conference on Networking and Services (ICNS'06).
[5] Wenke Lee,et al. A layered approach to simplified access control in virtualized systems , 2007, OPSR.
[6] Siani Pearson,et al. Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[7] Gil Neiger,et al. Intel virtualization technology , 2005, Computer.
[8] Rafal Wojtczuk. Subverting the Xen hypervisor , 2008 .
[9] Stefan Berger,et al. Building a MAC-based security architecture for the Xen open-source hypervisor , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[10] Ravi S. Sandhu,et al. Towards a discipline of mission-aware cloud computing , 2010, CCSW '10.
[11] Wenke Lee,et al. Taming Virtualization , 2008, IEEE Security & Privacy.
[12] Xiaoxin Chen,et al. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems , 2008, ASPLOS.
[13] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[14] Stephen Smalley,et al. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments , 2000 .
[15] Stefan Berger,et al. Shamon: A System for Distributed Mandatory Access Control , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[16] Jérémy Briffaut,et al. A dynamic end-to-end security for coordinating multiple protections within a Linux desktop , 2010, 2010 International Symposium on Collaborative Technologies and Systems.