Proceedings of the 2012 International Conference on Computer Application and System Modeling (ICCASM 2012)

VSIM: a Provable Secure Virtual Security Isolation Model

Authors
Jun Ma, Yuanbo Guo, Hongzhao Kou
Corresponding Author
Jun Ma
Available Online August 2012.
DOI
10.2991/iccasm.2012.304How to use a DOI?
Keywords
Virtualization, Security isolation, BLP model, Provable Secure
Abstract

With the continuous development of the network technology and the significant raising of the hardware’s performance-price ratio, it is a popular tendency that users access different kinds of network via endpoint computers for obtaining share/free resources. Meanwhile, endpoint computers act as endpoint computing platforms to provide basic serve for different security level networking. In this condition, different security level resources stored in personal endpoint computers incurs security threat which come up with new challenges to the existing security isolation mechanisms. In this paper, a new security isolation model is presented based on hardware level virtualization technology by comparing available isolation execution technologies, and is proved to satisfy the Bell-LaPadula (BLP) confidentiality model.

Copyright
© 2012, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2012 International Conference on Computer Application and System Modeling (ICCASM 2012)
Series
Advances in Intelligent Systems Research
Publication Date
August 2012
ISBN
978-94-91216-00-8
ISSN
1951-6851
DOI
10.2991/iccasm.2012.304How to use a DOI?
Copyright
© 2012, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Jun Ma
AU  - Yuanbo Guo
AU  - Hongzhao Kou
PY  - 2012/08
DA  - 2012/08
TI  - VSIM: a Provable Secure Virtual Security Isolation Model
BT  - Proceedings of the 2012 International Conference on Computer Application and System Modeling (ICCASM 2012)
PB  - Atlantis Press
SP  - 1194
EP  - 1197
SN  - 1951-6851
UR  - https://doi.org/10.2991/iccasm.2012.304
DO  - 10.2991/iccasm.2012.304
ID  - Ma2012/08
ER  -