An active trusted model for virtual machine systems

Wentao Qu, Minglu Li, Chuliang Weng

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

Virtualization is a new area for research in recent years, and virtualization technology can bring convenience to the management of computing resources. Together with the development of the network and the network computing, it gives the virtualization technology more scenarios. The cloud computing technology uses the virtualization technology as while. With the development of the technology, it meets some security problems, such as rootkit attacks and malignant tampers. Malicious programs can plug into the system, and be booted at the any time of the virtualized system. There is little theoretical research on booting a trusted virtualized system.We propose an active trusted model in order to give a theoretical model for not only analyzing the state of a virtualized system, but also helping to design trusted virtual machine application. TBoot is a project to boot a trusted virtual machine. We use our model to illustrate that TBoot can boot a trusted virtual machine theoretically.

Original languageEnglish
Title of host publicationProceedings - 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009
Pages145-152
Number of pages8
DOIs
StatePublished - 2009
Externally publishedYes
Event2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009 - Chengdu, Sichuan, China
Duration: 9 Aug 200912 Aug 2009

Publication series

NameProceedings - 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009

Conference

Conference2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009
Country/TerritoryChina
CityChengdu, Sichuan
Period9/08/0912/08/09

Keywords

  • Active model
  • Measure
  • Trusted virtual machine
  • Verify

Fingerprint

Dive into the research topics of 'An active trusted model for virtual machine systems'. Together they form a unique fingerprint.

Cite this