trusted computing, virtualization, Xen hypervisor New cost effective commodity PC hardware now includes fully virtualisable processors and the Trusted Computing Group's trusted platform module (TPM). This provides the opportunity to combine virtualisation, trusted computing and open source software development to tackle the security challenges modern computing faces. We believe that leveraging this technology to partition critical operating system services and applications into small modules with strictly controlled interactions is a good way to improve trustworthiness. To support the development of small applications running in Xen domains we built a library OS. We ported the GNU cross-development tool chain and standard C libraries t...
Integrating system-level virtualization technology with Trusted Computing technology can significant...
In view of some new security issues in the computing platform with virtualization technology, this p...
We present the sHype hypervisor security architecture and examine in detail its mandatory access con...
Virtual machine (VM) technology has been around for 40 years and has been experiencing a resurgence ...
A Trusted Virtual Domain (TVD) is a coalition of virtual machines and resources (e.g., network, stor...
Numerous systems have been designed which use virtualization to subdivide the ample resources of a m...
Numerous systems have been designed which use virtualization to subdivide the ample resources of a m...
The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in ...
During the past few years virtualization has strongly reemerged from the shadow of the mainframe gen...
A Trusted Virtual Domain (TVD) is a coalition of virtual machines and resources (e.g., network, stor...
Virtualization platforms have grown with an increasing demand for new technologies, with the modern ...
During the past few years virtualization has strongly reemerged from the shadow of the mainframe gen...
In recent years, powerful handheld computing devices such as personal digital assistants and mobile ...
Problems of overall safety management, appropriate load balance, and the need for easy-to-use emerge...
The integration of Trusted Computing technologies into vir-tualized computing environments enables t...
Integrating system-level virtualization technology with Trusted Computing technology can significant...
In view of some new security issues in the computing platform with virtualization technology, this p...
We present the sHype hypervisor security architecture and examine in detail its mandatory access con...
Virtual machine (VM) technology has been around for 40 years and has been experiencing a resurgence ...
A Trusted Virtual Domain (TVD) is a coalition of virtual machines and resources (e.g., network, stor...
Numerous systems have been designed which use virtualization to subdivide the ample resources of a m...
Numerous systems have been designed which use virtualization to subdivide the ample resources of a m...
The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in ...
During the past few years virtualization has strongly reemerged from the shadow of the mainframe gen...
A Trusted Virtual Domain (TVD) is a coalition of virtual machines and resources (e.g., network, stor...
Virtualization platforms have grown with an increasing demand for new technologies, with the modern ...
During the past few years virtualization has strongly reemerged from the shadow of the mainframe gen...
In recent years, powerful handheld computing devices such as personal digital assistants and mobile ...
Problems of overall safety management, appropriate load balance, and the need for easy-to-use emerge...
The integration of Trusted Computing technologies into vir-tualized computing environments enables t...
Integrating system-level virtualization technology with Trusted Computing technology can significant...
In view of some new security issues in the computing platform with virtualization technology, this p...
We present the sHype hypervisor security architecture and examine in detail its mandatory access con...