Security Architecture of Trusted Virtual Machine Monitor for Trusted Computing

被引:1
作者
HUANG Qiang SHEN Changxiang FANG Yanxiang College of Electric Engineering Naval University of Engineering Wuhan Hubei China Naval Institute of Computing Technology Beijing China College of Information Technical ScienceNankai University Tianjin China [1 ,2 ,2 ,3 ,1 ,430072 ,2 ,100841 ,3 ,300071 ]
机构
关键词
trusted computing; virtual machine monitor(VMM); separation kernel; trusted computing base (TCB);
D O I
暂无
中图分类号
TP316 [操作系统];
学科分类号
081202 ; 0835 ;
摘要
With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM architecture, TCG hard- ware and application-oriented “thin” virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied.
引用
收藏
页码:13 / 16
页数:4
相关论文
共 11 条
[1]  
Intel Virtualization Technol- ogy. Rich U,Gil N,Dion R, et al. Computer . 2005
[2]  
Xen and the Art of Virtual- ization. Borham P,Dragoric B,Fraser K, et al. Proceedings of the 19th ACM Symposium on Operat- ing Systems Principles . 2003
[3]  
Multi-Level Security Requirements for Hypervi- sors. Paul A. Computer Security Applications Conference, 21st Annual . 2005
[4]  
TPM Main Specification. Trusted Computing Group. https://www.trustedcomputinggro up.or g/ specs/TPM . 2006
[5]  
Design and Implementa- tion of a TCG-Based Integrity Measurement Architec- ture. Reiner S,Zhang X,Trent J,et al. Proceedings of the 13th Usenix Security Symposium . 2004
[6]  
Security Model for the Next-Generation Secure Computing Base. Microsoft. http://www. Mi- crosoft.com/resources/ngscb/documents/NGSCB_Security_ Model.doc . 2006
[7]  
Terra: A Virtual Machine-Based Platform for Trusted Computing. Tal G,Ben P,Jim C, et al. SOSP03 . 2003
[8]  
Building a MAC-Based Security Architecture for the Xen Opensource Hypervi- sor. Reiner S,Jaeger T,Valdez E ,et al. http://www.acsac.org/2005/papers /171.pdf . 2005
[9]  
Some Weaknesses of the TCB Model. Blakley B,Kienzle D. Proceedings of the 1997 IEEE Symposium on Security and Privacy . 1997
[10]  
A VMM Security Kernel for the VAX Architecture. Paul A,Mary E,Douglas W, et al. Proceedings of the IEEE Symposium on Research in Security and Privacy . 1990