{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:27:54Z","timestamp":1725568074717},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642149436"},{"type":"electronic","value":"9783642149443"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14944-3_6","type":"book-chapter","created":{"date-parts":[[2010,10,19]],"date-time":"2010-10-19T23:16:37Z","timestamp":1287530197000},"page":"43-54","source":"Crossref","is-referenced-by-count":0,"title":["CFCC: A Covert Flows Confinement Mechanism for Virtual Machine Coalitions"],"prefix":"10.1007","author":[{"given":"Ge","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Hai","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Deqing","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Alex K.","family":"Ohoussou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/HPCC.2008.172","volume-title":"10th IEEE Conference on High Performance Computing and Communications","author":"R. Buyya","year":"2008","unstructured":"Buyya, R., Yeo, C.S., Venugopal, S.: Market-oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities. In: 10th IEEE Conference on High Performance Computing and Communications, pp. 5\u201313. IEEE Press, Dalian (2008)"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: Above the Clouds: A Berkeley View of Cloud Computing. Technical Report, EECS, University of California at Berkeley (2009)","DOI":"10.1145\/1721654.1721672"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/1341312.1341321","volume":"42","author":"S. Berger","year":"2008","unstructured":"Berger, S., Caceres, R., Pendarakis, D., Sailer, R., Valdez, E., Perez, R., Schildhauer, W., Srinivasan, D.: TVDc: Managing Security in the Trusted Virtual Datacenter. ACM SIGOPS Operating Systems Review\u00a042, 40\u201347 (2008)","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1109\/CSAC.2005.13","volume-title":"21st Annual Computer Security Applications Conference","author":"R. Sailer","year":"2005","unstructured":"Sailer, R., Jaeger, T., Valdez, E., Caceres, R., Perez, R., Berger, S., Griffin, J.L., Doorn, L.V.: Building a MAC-Based Security Architecture for the Xen Open-source Hypervisor. In: 21st Annual Computer Security Applications Conference, pp. 276\u2013285. IEEE Press, Tucson (2005)"},{"key":"6_CR5","unstructured":"Commercial Technology in High Assurance Applications, http:\/\/www.vmware.com\/pdf\/TechTrendNotes.pdf"},{"key":"6_CR6","first-page":"23","volume-title":"22nd Annual Computer Security Applications Conference","author":"J.M. McCune","year":"2006","unstructured":"McCune, J.M., Jaeger, T., Berger, S., Caceres, R., Sailer, R.: Shamon: A System for Distributed Mandatory Access Control. In: 22nd Annual Computer Security Applications Conference, pp. 23\u201332. IEEE Press, Miami Beach (2006)"},{"key":"6_CR7","unstructured":"Griffin, J.L., Jaeger, T., Perez, R., Sailer, R., Doorn, L.V., Caceres, R.: Trusted Virtual Domains: Toward Secure Distributed Services. In: 1st IEEE Workshop on Hot Topics in System Dependability, Yokohama (2005)"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1145\/1315245.1315275","volume-title":"14th ACM conference on Computer and communications security","author":"S. Cabuk","year":"2007","unstructured":"Cabuk, S., Dalton, C.I., Ramasamy, H., Schunter, M.: Towards Automated Provisioning of Secure Virtualized Networks. In: 14th ACM conference on Computer and communications security, pp. 235\u2013245. ACM, Alexandria (2007)"},{"key":"6_CR9","unstructured":"Proctor, N.E., Neumann, P.G.: Architectural Implications of Covert Channels. In: 15th National Computer Security Conference, Baltimore, pp. 28\u201343 (1992)"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1145\/996943.996944","volume":"7","author":"T. Jaeger","year":"2004","unstructured":"Jaeger, T., Edwards, A., Zhang, X.: Consistency Analysis of Authorization Hook Placement in the Linux Security Modules Framework. ACM Transactions on Information and System Security\u00a07, 175\u2013205 (2004)","journal-title":"ACM Transactions on Information and System Security"},{"key":"6_CR11","first-page":"33","volume-title":"11th USENIX Security Symposium","author":"X. Zhang","year":"2002","unstructured":"Zhang, X., Edwards, A., Jaeger, T.: Using CQUAL for Static Analysis of Authorization Hook Placement. In: 11th USENIX Security Symposium, pp. 33\u201348. USENIX, San Francisco (2002)"},{"key":"6_CR12","doi-asserted-by":"publisher","first-page":"1481","DOI":"10.1109\/ICYCS.2008.534","volume-title":"9th International Conference for Young Computer Scientists","author":"G. Cheng","year":"2008","unstructured":"Cheng, G., Jin, H., Zhou, D., Ohoussou, A.K., Zhao, F.: A Prioritized Chinese Wall Model for Managing the Covert Information Flows in Virtual Machine Systems. In: 9th International Conference for Young Computer Scientists, pp. 1481\u20131487. IEEE Press, Hunan (2008)"},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/1266840.1266853","volume-title":"12th ACM symposium on Access control Models and Technologies","author":"T. Jaeger","year":"2007","unstructured":"Jaeger, T., Sailer, R., Sreenivasan, Y.: Managing the Risk of Covert Information Flows in Virtual Machine Systems. In: 12th ACM symposium on Access control Models and Technologies, pp. 81\u201390. ACM, Sophia Antipolis (2007)"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Boeboert, W.E., Kain, R.Y.: A Practical Alternative to Hierarchical Integrity Policies. In: 8th National Computer Security Conference, Gaithersburg (1985)","DOI":"10.1016\/0142-0496(85)90064-5"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-540-31979-5_28","volume-title":"Information Security Practice and Experience","author":"A.R. Sadeghi","year":"2005","unstructured":"Sadeghi, A.R., Stuble, C.: Towards Multilateral-Secure DRM Platforms. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds.) ISPEC 2005. LNCS, vol.\u00a03439, pp. 326\u2013337. Springer, Heidelberg (2005)"},{"key":"6_CR16","unstructured":"Trusted Computing Group, https:\/\/www.trustedcomputinggroup.org"},{"key":"6_CR17","unstructured":"Berger, S., C\u00e1ceres, R., Goldman, K., Perez, R., Sailer, R., Doorn, L.V.: vTPM: Virtualizing the Trusted Platform Module. In: 15th USENIX Security Symposium, Vancouver (2006)"},{"key":"6_CR18","first-page":"19","volume-title":"11th ACM Symposium on Access Control Models and Technologies","author":"T. Jaeger","year":"2006","unstructured":"Jaeger, T., Sailer, R., Shankar, U.: PRIMA: Policy-Reduced Integrity Measurement Architecture. In: 11th ACM Symposium on Access Control Models and Technologies, pp. 19\u201328. ACM, Lake Tahoe (2006)"},{"key":"6_CR19","first-page":"16","volume-title":"13th conference on USENIX Security Symposium","author":"R. Sailer","year":"2004","unstructured":"Sailer, R., Zhang, X., Jaeger, T., Doorn, L.V.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: 13th conference on USENIX Security Symposium, pp. 16\u201331. USENIX, San Diego (2004)"},{"key":"6_CR20","first-page":"221","volume-title":"23rd Annual Computer Security Applications Conference","author":"E. Valdez","year":"2007","unstructured":"Valdez, E., Sailer, R., Perez, R.: Retrofitting the IBM POWER Hypervisor to Support Mandatory Access Control. In: 23rd Annual Computer Security Applications Conference, pp. 221\u2013231. IEEE Press, Miami Beach (2007)"},{"key":"6_CR21","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1145\/945445.945462","volume-title":"19th ACM symposium on Operating systems principles","author":"P. Barham","year":"2003","unstructured":"Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the Art of Virtualization. In: 19th ACM symposium on Operating systems principles, pp. 164\u2013177. ACM, Bolton Landing (2003)"},{"key":"6_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/10722599_2","volume-title":"Computer Security - ESORICS 2000","author":"G. Schellhorn","year":"2000","unstructured":"Schellhorn, G., Reif, W., Schairer, A., Karger, P., Austel, V., Toll, D.: Verification of a Formal Security Model for Multiapplicative Smart Cards. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol.\u00a01895, pp. 17\u201336. Springer, Heidelberg (2000)"},{"key":"6_CR23","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1109\/SECPRI.1989.36295","volume-title":"1989 IEEE Symposium on Security and Privacy","author":"D.F.C. Brewer","year":"1989","unstructured":"Brewer, D.F.C., Nash, M.J.: The Chinese Wall Security Policy. In: 1989 IEEE Symposium on Security and Privacy, pp. 206\u2013214. IEEE Press, Oakland (1989)"}],"container-title":["Communications in Computer and Information Science","Systems and Virtualization Management. Standards and the Cloud"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14944-3_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T08:41:58Z","timestamp":1619772118000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14944-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642149436","9783642149443"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14944-3_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}