Virtual machines and data security

  • Authors:
  • C. R. Attanasio

  • Affiliations:
  • -

  • Venue:
  • Proceedings of the workshop on virtual computer systems
  • Year:
  • 1973

Quantified Score

Hi-index 0.00

Visualization

Abstract

Our concern is the ability of the computing system to ensure that data under its control is accessed only in accordance with the explicit intention of the owner of the data, as expressed in the directory or access control table of the system. We intend to use VM/370 as the base system for a study of how the security of data may be compromised. Our goal for this study is to be better able to evaluate different types of hardware and software system architectures with regard to their ability to provide security.