Features of Information Security by Using Virtual Machine Monitor
The paper presents the results of research of the method that increases the information processing security, circulating within the inherited operating systems, based on virtualization technology. This method is based on the so-called “sandbox” concept, implemented by means of virtual machine monito...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Moscow Engineering Physics Institute
2010-03-01
|
Series: | Bezopasnostʹ Informacionnyh Tehnologij |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/781 |
id |
doaj-f9ce6b815cee47beac3c917de37fa781 |
---|---|
record_format |
Article |
spelling |
doaj-f9ce6b815cee47beac3c917de37fa7812020-11-24T22:55:59ZengMoscow Engineering Physics Institute Bezopasnostʹ Informacionnyh Tehnologij2074-71282074-71362010-03-011719798771Features of Information Security by Using Virtual Machine MonitorA. S. NikolaevThe paper presents the results of research of the method that increases the information processing security, circulating within the inherited operating systems, based on virtualization technology. This method is based on the so-called “sandbox” concept, implemented by means of virtual machine monitor and giving to the guest OS the limited set of interaction tools (interfaces) with the host OS. The research examines features of interaction organization between guest and host systems, and also ways of information flows management, circulating between them, by introduction the host OS security policies.https://bit.mephi.ru/index.php/bit/article/view/781virtualizationinherited operating systemsmandatory access control |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
A. S. Nikolaev |
spellingShingle |
A. S. Nikolaev Features of Information Security by Using Virtual Machine Monitor Bezopasnostʹ Informacionnyh Tehnologij virtualization inherited operating systems mandatory access control |
author_facet |
A. S. Nikolaev |
author_sort |
A. S. Nikolaev |
title |
Features of Information Security by Using Virtual Machine Monitor |
title_short |
Features of Information Security by Using Virtual Machine Monitor |
title_full |
Features of Information Security by Using Virtual Machine Monitor |
title_fullStr |
Features of Information Security by Using Virtual Machine Monitor |
title_full_unstemmed |
Features of Information Security by Using Virtual Machine Monitor |
title_sort |
features of information security by using virtual machine monitor |
publisher |
Moscow Engineering Physics Institute |
series |
Bezopasnostʹ Informacionnyh Tehnologij |
issn |
2074-7128 2074-7136 |
publishDate |
2010-03-01 |
description |
The paper presents the results of research of the method that increases the information processing security, circulating within the inherited operating systems, based on virtualization technology. This method is based on the so-called “sandbox” concept, implemented by means of virtual machine monitor and giving to the guest OS the limited set of interaction tools (interfaces) with the host OS. The research examines features of interaction organization between guest and host systems, and also ways of information flows management, circulating between them, by introduction the host OS security policies. |
topic |
virtualization inherited operating systems mandatory access control |
url |
https://bit.mephi.ru/index.php/bit/article/view/781 |
work_keys_str_mv |
AT asnikolaev featuresofinformationsecuritybyusingvirtualmachinemonitor |
_version_ |
1725655355735670784 |