Multi-level security requirements for hypervisors

@article{Karger2005MultilevelSR,
  title={Multi-level security requirements for hypervisors},
  author={Paul A. Karger},
  journal={21st Annual Computer Security Applications Conference (ACSAC'05)},
  year={2005},
  pages={9 pp.-275}
}
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on secure hypervisors, including PR/SM, NetTop, sHype, and others. This paper looks at the requirements that users of MLS systems have and discusses their implications on the design of multi-level secure hypervisors. It contrasts the new directions for secure hypervisors with the earlier efforts of KVM/370 and Digital's… CONTINUE READING

Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 35 CITATIONS

A Survey on the Security of Hypervisors in Cloud Computing

  • 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops
  • 2015
VIEW 1 EXCERPT
CITES BACKGROUND

In Guards We Trust: Security and Privacy in Operating Systems Revisited

  • 2013 International Conference on Social Computing
  • 2013
VIEW 2 EXCERPTS
CITES BACKGROUND & METHODS

On state of the art in virtual machine security

  • 2012 Proceedings of IEEE Southeastcon
  • 2012
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 34 REFERENCES

Thirty years later: lessons from the Multics security evaluation

  • 18th Annual Computer Security Applications Conference, 2002. Proceedings.
  • 2002
VIEW 7 EXCERPTS

On the Duality of Operating System Structures

  • Operating Systems Review
  • 1978
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

VM and the VM Community: Past Present, and Future. in SHARE 89, Sessions 9059-9061

M. Varian
  • 1997
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Evolution of a Virtual Machine Subsystem

  • IBM Systems Journal
  • 1979
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

IBM Offers Support for Xen

S. M. Kerner
  • internetnews.com,
  • 2005
VIEW 1 EXCERPT

Swanberg, Advanced Virtualization Capabilities of POWER5 Systems

W. J. Armstrong, R. L. Amdt, +5 authors R.C
  • IBM Journal of Research and Development, July/September 2005
  • 2005