Dynamic verification of operating system decisions
Communications of the ACM
Virtualizing the VAX architecture
ISCA '91 Proceedings of the 18th annual international symposium on Computer architecture
A Retrospective on the VAX VMM Security Kernel
IEEE Transactions on Software Engineering
Databsse system approach the management decision support
ACM Transactions on Database Systems (TODS)
Architecture of virtual machines
Proceedings of the workshop on virtual computer systems
A Case For Grid Computing On Virtual Machines
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Proceedings of the 37th SIGCSE technical symposium on Computer science education
Analysis of the Intel Pentium's ability to support a secure virtual machine monitor
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
A layered approach to simplified access control in virtualized systems
ACM SIGOPS Operating Systems Review
Evaluating the Performance Impact of Xen on MPI and Process Execution For HPC Systems
VTDC '06 Proceedings of the 2nd International Workshop on Virtualization Technology in Distributed Computing
Reusability of Functionality-Based Application Confinement Policy Abstractions
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
The evolution of virtual machine architecture
AFIPS '73 Proceedings of the June 4-8, 1973, national computer conference and exposition
Architecture of virtual machines
AFIPS '73 Proceedings of the June 4-8, 1973, national computer conference and exposition
Securing virtual machine monitors: what is needed?
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Bunker: a privacy-oriented platform for network tracing
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Secure in-VM monitoring using hardware virtualization
Proceedings of the 16th ACM conference on Computer and communications security
Separating hypervisor trusted computing base supported by hardware
Proceedings of the fifth ACM workshop on Scalable trusted computing
ACM Transactions on Information and System Security (TISSEC)
CyberGuarder: A virtualization security assurance architecture for green cloud computing
Future Generation Computer Systems
Delivering secure applications on commercial mobile devices: the case for bare metal hypervisors
Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
Paravirtualization for HPC systems
ISPA'06 Proceedings of the 2006 international conference on Frontiers of High Performance Computing and Networking
The use of hardware virtualization in the context of information security
Programming and Computing Software
An approach to a trustworthy system architecture using virtualization
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Client-controlled cryptography-as-a-service in the cloud
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Hi-index | 0.01 |
Security is an important factor if the programs of independent and possibly malicious users are to coexist on the same computer system. In this paper we show that a combined virtual machine monitor/operating system (VMM/OS) approach to information system isolation provides substantially better software security than a conventional multiprogramming operating system approach. This added protection is derived from redundant security using independent mechanisms that are inherent in the design of most VMM/OS systems.