Another Approach in Building a Secure Server OS, Based on Using Virtualization

سال انتشار: 1392
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 1,952

فایل این مقاله در 17 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ECDC07_057

تاریخ نمایه سازی: 9 تیر 1392

چکیده مقاله:

In this paper the issue of building a secure operating system, as the most important system software, is discussed. Securing operating systems have mainly two traditionalapproaches: First is reviewing and making secure configurations, and the second is disabling unnecessary services. In this research, these two approaches are reviewed, then the third approach will be presented. In this new approach the important system services will run in isolated virtual machines. Separated services greatly reduce the risk of attack and increase security of operating system. One of the most important benefitsof our new approach is the minimal cost of implementation by using the recently available virtualization technologies.

نویسندگان

Seyyed Mohsen Seyyedsalehi

K.N.Toosi University of Technology,Tehran, Iran

Seyyedeh Fatemeh Malek

Amirkabir University of Technology,Tehran, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • M. D. Bauer, Building Secure Servers with Linux, O'Reilly, 2002. ...
  • _ Steinberg , Bermhard Kauer, NOVA: a m icrohyperviso r-based ...
  • National Institute of Standards and Technology, http://nist.gov, 2012. ...
  • Yoshiki Sameshima, Hideaki Saisho, Tsutomu Matsumoto, and Norihisa Komoda, Windows ...
  • P .Padala, X. Zhu, Z. Wang, S. Singhal, K. G. ...
  • _ Christodores cu , Reiner Sailer , Douglas Lee Schales ...
  • XenSource, http ://www _ XenSourc, _ , 2012. ...
  • P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, ...
  • OpenVZ: http :/penvz.org , 2012. ...
  • (1] S. Bhattiprolu, W. Biederman, S. Hallyn, D. Lezcano, Virtual ...
  • Linux VServer, http : //inux -Vserver org , 2010. ...
  • Virtuozzo, http : //www _ SW S O ft. c ...
  • Fred Cohen, The Virtualization Solution, IEEE Security and Privacy, vol. ...
  • (4] Flavio Lombardi, Roberto Di Pietro, Secure virtualization for cloud ...
  • Diane Barrett, Gregory Kipper, Virtualization Challenges, Virtualization and Forensics, Syngress, ...
  • Flavio Lombardi _ Roberto Di Pietro, KvmSec: a security extension ...
  • Flavio Lombardi and Roberto Di Pietro. Secure virtualization for cloud ...
  • Bastille linux, http : //www .bastille-linuk .org, 2012. ...
  • John Hoopes. Virtualization for Security: Including Sandboxing, Disaster Recovery, High ...
  • Karen A. Scarfone, Murugiah P. Souppaya, and Paul Hoffma. SP ...
  • Yan Wen, Jinjing Zhao, Gang Zhao, Hua Chen, and Dongxia ...
  • Kun Wang, Jia Rao, and Cheng-Zhong Xu. Rethink the virtual ...
  • http : //www _ _ are _ c O m/p ...
  • Yang Yu. 2007. Os-Level Virtualization and its Applications. Ph.D. Dissertation. ...
  • Ryan Shea and Jiangchuan Liu. Understanding the impact of denial ...
  • Yih Huang and Anup K. Ghosh. Automating Intrusion Response via ...
  • Ruo Ando, Zong-Hua Zhang, Youki Kadobayashi, and Yoichi Shinoda. A ...
  • Autonomic and Secure Computing (DASC _ IEEE Computer Society, Washington, ...
  • نمایش کامل مراجع