Features of Information Security by Using Virtual Machine Monitor

The paper presents the results of research of the method that increases the information processing security, circulating within the inherited operating systems, based on virtualization technology. This method is based on the so-called “sandbox” concept, implemented by means of virtual machine monito...

Full description

Bibliographic Details
Main Author: A. S. Nikolaev
Format: Article
Language:English
Published: Moscow Engineering Physics Institute 2010-03-01
Series:Bezopasnostʹ Informacionnyh Tehnologij
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/781
id doaj-f9ce6b815cee47beac3c917de37fa781
record_format Article
spelling doaj-f9ce6b815cee47beac3c917de37fa7812020-11-24T22:55:59ZengMoscow Engineering Physics Institute Bezopasnostʹ Informacionnyh Tehnologij2074-71282074-71362010-03-011719798771Features of Information Security by Using Virtual Machine MonitorA. S. NikolaevThe paper presents the results of research of the method that increases the information processing security, circulating within the inherited operating systems, based on virtualization technology. This method is based on the so-called “sandbox” concept, implemented by means of virtual machine monitor and giving to the guest OS the limited set of interaction tools (interfaces) with the host OS. The research examines features of interaction organization between guest and host systems, and also ways of information flows management, circulating between them, by introduction the host OS security policies.https://bit.mephi.ru/index.php/bit/article/view/781virtualizationinherited operating systemsmandatory access control
collection DOAJ
language English
format Article
sources DOAJ
author A. S. Nikolaev
spellingShingle A. S. Nikolaev
Features of Information Security by Using Virtual Machine Monitor
Bezopasnostʹ Informacionnyh Tehnologij
virtualization
inherited operating systems
mandatory access control
author_facet A. S. Nikolaev
author_sort A. S. Nikolaev
title Features of Information Security by Using Virtual Machine Monitor
title_short Features of Information Security by Using Virtual Machine Monitor
title_full Features of Information Security by Using Virtual Machine Monitor
title_fullStr Features of Information Security by Using Virtual Machine Monitor
title_full_unstemmed Features of Information Security by Using Virtual Machine Monitor
title_sort features of information security by using virtual machine monitor
publisher Moscow Engineering Physics Institute
series Bezopasnostʹ Informacionnyh Tehnologij
issn 2074-7128
2074-7136
publishDate 2010-03-01
description The paper presents the results of research of the method that increases the information processing security, circulating within the inherited operating systems, based on virtualization technology. This method is based on the so-called “sandbox” concept, implemented by means of virtual machine monitor and giving to the guest OS the limited set of interaction tools (interfaces) with the host OS. The research examines features of interaction organization between guest and host systems, and also ways of information flows management, circulating between them, by introduction the host OS security policies.
topic virtualization
inherited operating systems
mandatory access control
url https://bit.mephi.ru/index.php/bit/article/view/781
work_keys_str_mv AT asnikolaev featuresofinformationsecuritybyusingvirtualmachinemonitor
_version_ 1725655355735670784