期刊文献+

基于Xen硬件虚拟机的安全通信机制研究 被引量:5

Research on Secure-communication Mechanism Based Xen Hardware Virtual Machine
在线阅读 下载PDF
导出
摘要 在深入分析Xen硬件虚拟机通信机制和网络安全控制技术的基础上,实现了Xen硬件虚拟机安全通信机制,它在虚拟机监控器上加入了一个安全服务器,同时在虚拟机进行网络通信的关键路径上添加安全检查模块,实现了虚拟机通信的访问控制,提高了虚拟域间通信的安全性。 This paper has realized Xen hardware virtual machine safe-communition on basis of researching communition mechanism on Xen hardware virtual machine and network security control in detail,which joins a secure sever in virtual machine monitor and appends some security checking module in the key-path of virtual machine' s network communication.it has carried out the access control of virtual machine communition, improved the safety of virtual machine' s communition.
出处 《计算机安全》 2010年第3期30-31,46,共3页 Network & Computer Security
关键词 虚拟机 网络 安全通信 VT--X 虚拟网卡 virtual machine network safe-communition VT-X virtual adapter
  • 相关文献

参考文献8

  • 1朱鸿伟.虚拟化安全关键技术研究.浙江大学,2008.5.14.
  • 2The Xen Tea, m University of Cambridge,UK. Users' Manual Xen v3.0.
  • 3余珂,杨晓伟.Xen虚拟I/O设备实现与性能分析.
  • 4George Coker .Xen Security Modules (XSM).Nationai Information Assurance Research Lab National Security Agency (NSA).
  • 5D Abrarnson,J jackson,S Muthrasanallur.Intel virtualization technology for directed I/O.Intel Technology Journal,2006.
  • 6李超,郭晓琼.Xen中的I/O操作[技术报告].上海:上海交通大学.2007.
  • 7赵凡.VMX虚拟机设备模型设计研究与虚拟网卡实现.南京理工大学,2006.6.
  • 8付赛平,任国林.XEN网络I/O完全虚拟化机制的可扩展性研究[J].计算机工程,2008,34(23):102-104. 被引量:7

二级参考文献4

  • 1董耀祖,周正伟.基于X86架构的系统虚拟机技术与应用[J].计算机工程,2006,32(13):71-73. 被引量:64
  • 2Umeno H, Parayno M L C, Teramoto K, et al. Performance Evaluation on Server Consolidation Using Virtual Machines[C]// Proc. of SICE-ICASE International Joint Conference. Busan, Korea: [s. n.], 2006: 2730-2734.
  • 3Dong Yaozu, Mallick A, Yang Fred, et al. Extending Xen with Intel Virtualization Technology[J]. Intel Technology Journal, 2006, 10(3): 193-202.
  • 4Menon A, Santos R J, Turner Y, et al Overheads in the Xen Virtual Machine the 1st ACM/USENIX International Execution Environments. Chicago, USA: Diagnosing Performance Environment[C]//Proc. of Conference on Virtual [s. n.], 2005: 13-23.

共引文献6

同被引文献30

  • 1BARHAM P, DRAGOVIC B, FRASER K, et al. Xen and the Art ofVirtualization[J]. ACM, 2003(08): 164-177.
  • 2GARFINKEL T, ADAMS K, WARFIELD A, et al. Compatibility Is Not Transparency: Vmm Detection Myths and Realities[C]// HOTO'07: Proceedings of the 11thconfernee on Hot Topics in Operating Systems. NY, USA: ACM Press, 2007.
  • 3KARGER P. Performance and Security Lessons Learned from Virtualizing the Alpha processor[C]//ISCA '07 : Proceedings of the 34th Annual International Sysposium on Computer Architecture. New York, NY, USA: ACMPress, 2007: 392-401.
  • 4Secunia.com. Xen Multiple Vulnerabilities[EB/OL]. (2007-03-05) [2010-10-11]. http: //secunia.com/advisories/26986/.
  • 5TAVIS O. An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments[EB/OL]. (2007-05-10)[2010- 10-15]. http : //taviso.decsystem.org/virtsec.pdf.
  • 6SAILER R, VALDEZ E, JAEGER T, et al. Shype: Secure Hypervisor Approach to Trusted Virtualized System[EB/OL]. (2005-07-05)[2010-10-20]. http: //citeseerx.ist.psu.edu/ viewdoc/download?doi= 10.1.1.120.5037&rep=rep 1 &type=pdf.
  • 7怀进鹏,李沁,胡春明.基于虚拟机的虚拟计算环境研究与设计[J].软件学报,2007,18(8):2016-2026. 被引量:80
  • 8Fraser K,Hand S,Neugebauer R,et al.Safe hardware access with the Xen virtual machine monitor[C]//Proceedings of the 1st Workshop on Operating System and Architectural Support for the,Demand IT Infrastructure(OASIS).Boston,USA:[s.n.],2004:1-10.
  • 9Barham P,Dragovic B,Fraser K,et al.Xen and the Art of Virtualization[C]//The nineteenth ACM symposium on operating systems principles.New York,NY,USA:[s.n.],2003:164-177.
  • 10Cho Y C,Jeon J W.Sharing Data Between Process Running on Different Domains on Para-virutalized Xen[C]//International Conference on Control.Automation and Systems.[s.l.]:[s.n.],2007:1255-1260.

引证文献5

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部