A Prioritized Chinese Wall Model for Managing the Covert Information Flows in Virtual Machine Systems

@article{Cheng2008APC,
  title={A Prioritized Chinese Wall Model for Managing the Covert Information Flows in Virtual Machine Systems},
  author={Ge Cheng and Hai Jin and Deqing Zou and Alex K. Ohoussou and Feng Zhao},
  journal={2008 The 9th International Conference for Young Computer Scientists},
  year={2008},
  pages={1481-1487}
}
In virtual machine (VM) systems, mandatory access control (MAC) enforcement is possible now. This technique is both stronger and more flexible than traditional VM isolation, even if network communication is controlled. Unfortunately all of the VM systems with the MAC enforcement does not consider that the MAC controls may be distorted by covert channels… CONTINUE READING