{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:27:53Z","timestamp":1725568073805},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642149436"},{"type":"electronic","value":"9783642149443"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14944-3_2","type":"book-chapter","created":{"date-parts":[[2010,10,19]],"date-time":"2010-10-19T23:16:37Z","timestamp":1287530197000},"page":"13-18","source":"Crossref","is-referenced-by-count":1,"title":["Chinese Wall Isolation Mechanism and Its Implementation on VMM"],"prefix":"10.1007","author":[{"given":"Guanhai","family":"Wang","sequence":"first","affiliation":[]},{"given":"Minglu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chuliang","family":"Weng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1533057.1533059","volume-title":"ASIACCS 2009: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security","author":"P.A. Karger","year":"2009","unstructured":"Karger, P.A.: Securing virtual machine monitors: what is needed? In: ASIACCS 2009: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 1\u20132. ACM, New York (2009)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Sailer, R., Jaeger, T., Valdez, E., Caceres, R., Perez, R., Berger, S., Griffin, J.L., van Doorn, L.: Building a mac-based security architecture for the xen open-source hypervisor. In: ACSAC 2005: Proceedings of the 21st Annual Computer Security Applications Conference, Washington, DC, USA, pp. 276\u2013285. IEEE Computer Society, Los Alamitos (2005)","DOI":"10.1109\/CSAC.2005.13"},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/1266840.1266853","volume-title":"SACMAT 2007: Proceedings of the 12th ACM symposium on Access control models and technologies","author":"T. Jaeger","year":"2007","unstructured":"Jaeger, T., Sailer, R., Sreenivasan, Y.: Managing the risk of covert information flows in virtual machine systems. In: SACMAT 2007: Proceedings of the 12th ACM symposium on Access control models and technologies, pp. 81\u201390. ACM, New York (2007)"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Brewer, D.F.C., Nash, M.J.: The chinese wall security policy. In: Proceedings of the 1989 IEEE Symposium on Security and Privacy (May 1989)","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1145\/945445.945462","volume-title":"SOSP 2003: Proceedings of the nineteenth ACM symposium on Operating systems principles","author":"P. Barham","year":"2003","unstructured":"Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: SOSP 2003: Proceedings of the nineteenth ACM symposium on Operating systems principles, pp. 164\u2013177. ACM, New York (2003)"},{"key":"2_CR6","unstructured":"Meushaw, R., Simard, D.: Nettop commercial technology in high assurance applications. Technical report (2000)"},{"key":"2_CR7","doi-asserted-by":"publisher","first-page":"1481","DOI":"10.1109\/ICYCS.2008.534","volume-title":"ICYCS 2008: Proceedings of the 2008 The 9th International Conference for Young Computer Scientists","author":"G. Cheng","year":"2008","unstructured":"Cheng, G., Jin, H., Zou, D., Ohoussou, A.K., Zhao, F.: A prioritized chinese wall model for managing the covert information flows in virtual machine systems. In: ICYCS 2008: Proceedings of the 2008 The 9th International Conference for Young Computer Scientists, Washington, DC, USA, pp. 1481\u20131487. IEEE Computer Society, Los Alamitos (2008)"},{"key":"2_CR8","unstructured":"Percival, C.: Cache missing for fun and profit. In: BSDCan 2005, Ottawa (2005)"},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1109\/ACSAC.2006.20","volume-title":"ACSAC 2006: Proceedings of the 22nd Annual Computer Security Applications Conference","author":"Z. Wang","year":"2006","unstructured":"Wang, Z., Lee, R.B.: Covert and side channels due to processor architecture. In: ACSAC 2006: Proceedings of the 22nd Annual Computer Security Applications Conference, Washington, DC, USA, pp. 473\u2013482. IEEE Computer Society, Los Alamitos (2006)"}],"container-title":["Communications in Computer and Information Science","Systems and Virtualization Management. Standards and the Cloud"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14944-3_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T08:41:57Z","timestamp":1619772117000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14944-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642149436","9783642149443"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14944-3_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}