TY - GEN
T1 - An active trusted model for virtual machine systems
AU - Qu, Wentao
AU - Li, Minglu
AU - Weng, Chuliang
PY - 2009
Y1 - 2009
N2 - Virtualization is a new area for research in recent years, and virtualization technology can bring convenience to the management of computing resources. Together with the development of the network and the network computing, it gives the virtualization technology more scenarios. The cloud computing technology uses the virtualization technology as while. With the development of the technology, it meets some security problems, such as rootkit attacks and malignant tampers. Malicious programs can plug into the system, and be booted at the any time of the virtualized system. There is little theoretical research on booting a trusted virtualized system.We propose an active trusted model in order to give a theoretical model for not only analyzing the state of a virtualized system, but also helping to design trusted virtual machine application. TBoot is a project to boot a trusted virtual machine. We use our model to illustrate that TBoot can boot a trusted virtual machine theoretically.
AB - Virtualization is a new area for research in recent years, and virtualization technology can bring convenience to the management of computing resources. Together with the development of the network and the network computing, it gives the virtualization technology more scenarios. The cloud computing technology uses the virtualization technology as while. With the development of the technology, it meets some security problems, such as rootkit attacks and malignant tampers. Malicious programs can plug into the system, and be booted at the any time of the virtualized system. There is little theoretical research on booting a trusted virtualized system.We propose an active trusted model in order to give a theoretical model for not only analyzing the state of a virtualized system, but also helping to design trusted virtual machine application. TBoot is a project to boot a trusted virtual machine. We use our model to illustrate that TBoot can boot a trusted virtual machine theoretically.
KW - Active model
KW - Measure
KW - Trusted virtual machine
KW - Verify
UR - https://www.scopus.com/pages/publications/70449498812
U2 - 10.1109/ISPA.2009.68
DO - 10.1109/ISPA.2009.68
M3 - 会议稿件
AN - SCOPUS:70449498812
SN - 9780769537474
T3 - Proceedings - 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009
SP - 145
EP - 152
BT - Proceedings - 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009
T2 - 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009
Y2 - 9 August 2009 through 12 August 2009
ER -