Security architecture for a virtual heterogeneous machine

@article{Wright1998SecurityAF,
  title={Security architecture for a virtual heterogeneous machine},
  author={Roger Wright and David J. Shifflett and Cynthia E. Irvine},
  journal={Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)},
  year={1998},
  pages={167-177}
}
We describe security for a virtual heterogeneous machine (VHM). Our security architecture is based upon separation of services into four distinct domains. It is designed to take advantage of operating system support for domains, where available. We have chosen to use emerging public key technology as an interim solution to provide domain separation. A prototype demonstration of our architecture has been developed. 

Citations

Publications citing this paper.
SHOWING 1-9 OF 9 CITATIONS

Scheduling security-critical real-time applications on clusters

  • IEEE Transactions on Computers
  • 2006
VIEW 1 EXCERPT
CITES BACKGROUND

SAREC: a security-aware scheduling strategy for real-time applications on clusters

  • 2005 International Conference on Parallel Processing (ICPP'05)
  • 2005
VIEW 1 EXCERPT
CITES BACKGROUND

Toward quality of security service in a resource management system benefit function

  • Proceedings 9th Heterogeneous Computing Workshop (HCW 2000) (Cat. No.PR00556)
  • 2000
VIEW 1 EXCERPT
CITES BACKGROUND

Passive, domain-independent, end-to-end message passing performance monitoring to support adaptive applications in MSHN

  • Proceedings. The Eighth International Symposium on High Performance Distributed Computing (Cat. No.99TH8469)
  • 1999
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.

Using TNI Concepts for the Near Term Use of High Assurance Database Management Systems

C. E. Irvine, R. R. Schell, M. F. Thompson
  • Proceedings Fourth RADC Database Security Workshop
  • 1990