Sciweavers

14 search results - page 1 / 3
» Beyond the Hypervisor Hype
Sort
View
ACSAC
2005
IEEE
13 years 10 months ago
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor
We present the sHype hypervisor security architecture and examine in detail its mandatory access control facilities. While existing hypervisor security approaches aiming at high a...
Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ra...
ACSAC
2005
IEEE
13 years 10 months ago
Multi-Level Security Requirements for Hypervisors
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
Paul A. Karger
CCS
2011
ACM
12 years 4 months ago
Eliminating the hypervisor attack surface for a more secure cloud
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a l...
Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer R...
HOTOS
2007
IEEE
13 years 8 months ago
Hype and Virtue
In this paper, we question whether hypervisors are really acting as a disruptive force in OS research, instead arguing that they have so far changed very little at a technical lev...
Timothy Roscoe, Kevin Elphinstone, Gernot Heiser