{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T02:08:40Z","timestamp":1725674920212},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642297397"},{"type":"electronic","value":"9783642297403"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29740-3_47","type":"book-chapter","created":{"date-parts":[[2012,4,13]],"date-time":"2012-04-13T17:54:04Z","timestamp":1334339644000},"page":"416-425","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["PIGA-Virt: An Advanced Distributed MAC Protection of Virtual Systems"],"prefix":"10.1007","author":[{"given":"J.","family":"Briffaut","sequence":"first","affiliation":[]},{"given":"E.","family":"Lefebvre","sequence":"additional","affiliation":[]},{"given":"J.","family":"Rouzaud-Cornabas","sequence":"additional","affiliation":[]},{"given":"C.","family":"Toinard","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"47_CR1","unstructured":"BitVisor 1.1 Reference Manual (2010), \n                    \n                      http:\/\/www.bitvisor.org\/"},{"issue":"1","key":"47_CR2","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/MSP.2008.24","volume":"6","author":"M. Carbone","year":"2008","unstructured":"Carbone, M., Zamboni, D., Lee, W.: Taming virtualization. IEEE Security and Privacy\u00a06(1), 65\u201367 (2008)","journal-title":"IEEE Security and Privacy"},{"key":"47_CR3","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/1353535.1346284","volume":"42","author":"X. Chen","year":"2008","unstructured":"Chen, X., Garfinkel, T., Christopher Lewis, E., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., Dwoskin, J., Ports, D.R.K.: Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. SIGOPS Oper. Syst. Rev.\u00a042, 2\u201313 (2008)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"47_CR4","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/MSP.2010.45","volume":"8","author":"T. Jaeger","year":"2010","unstructured":"Jaeger, T., Schiffman, J.: Outlook: Cloudy with a chance of security challenges and improvements. IEEE Security and Privacy\u00a08, 77\u201380 (2010)","journal-title":"IEEE Security and Privacy"},{"key":"47_CR5","first-page":"509","volume-title":"Proceedings of the 2010 IEEE Workshop on Collaboration and Security (COLSEC 2010)","author":"C.T.J. Briffaut","year":"2010","unstructured":"Briffaut, C.T.J., Peres, M.: A dynamic end-to-end security for coordinating multiple protections within a linux desktop. In: Proceedings of the 2010 IEEE Workshop on Collaboration and Security (COLSEC 2010), pp. 509\u2013515. IEEE Computer Society, Chicago (2010)"},{"key":"47_CR6","unstructured":"Loscocco, P.A., Smalley, S.D., Muckelbauer, P.A., Taylor, R.C., Turner, S.J., Farrell, J.F.: The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. In: Proceedings of the 21st National Information Systems Security Conference, Arlington, Virginia, USA, pp. 303\u2013314 (October 1998)"},{"key":"47_CR7","first-page":"23","volume-title":"Proceedings of the 22nd Annual Computer Security Applications Conference","author":"J.M. McCune","year":"2006","unstructured":"McCune, J.M., Jaeger, T., Berger, S., Caceres, R., Sailer, R.: Shamon: A system for distributed mandatory access control. In: Proceedings of the 22nd Annual Computer Security Applications Conference, pp. 23\u201332. IEEE Computer Society, Washington, DC (2006)"},{"key":"47_CR8","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/1278901.1278905","volume":"41","author":"B.D. Payne","year":"2007","unstructured":"Payne, B.D., Sailer, R., C\u00e1ceres, R., Perez, R., Lee, W.: A layered approach to simplified access control in virtualized systems. SIGOPS Oper. Syst. Rev.\u00a041, 12\u201319 (2007)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"47_CR9","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1109\/CloudCom.2010.66","volume-title":"Proceedings of the 2010 IEEE Second International Conference on Cloud Computing Technology and Science, CLOUDCOM 2010","author":"S. Pearson","year":"2010","unstructured":"Pearson, S., Benameur, A.: Privacy, security and trust issues arising from cloud computing. In: Proceedings of the 2010 IEEE Second International Conference on Cloud Computing Technology and Science, CLOUDCOM 2010, pp. 693\u2013702. IEEE Computer Society, Washington, DC (2010)"},{"key":"47_CR10","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/ICNS.2006.13","volume-title":"ICNS 2006: Proceedings of the International Conference on Networking and Services","author":"N.A. Quynh","year":"2006","unstructured":"Quynh, N.A., Takefuji, Y.: A real-time integrity monitor for xen virtual machine. In: ICNS 2006: Proceedings of the International Conference on Networking and Services, p. 90. IEEE Computer Society, Washington, DC (2006)"},{"key":"47_CR11","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/1542207.1542243","volume-title":"Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009","author":"S. Rueda","year":"2009","unstructured":"Rueda, S., Vijayakumar, H., Jaeger, T.: Analysis of virtual machine system policies. In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, pp. 227\u2013236. ACM, New York (2009)"},{"key":"47_CR12","unstructured":"Sailer, R., Jaeger, T., Valdez, E., Caceres, R., Perez, R., Berger, S., Griffin, J.L., Van Doorn, L., Center, I.B.M.T.J.W.R., Hawthorne, N.Y.: Building a MAC-based security architecture for the Xen open-source hypervisor. In: 21st Annual Computer Security Applications Conference, p. 10 (2005)"},{"key":"47_CR13","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/1866835.1866839","volume-title":"Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW 2010","author":"R. Sandhu","year":"2010","unstructured":"Sandhu, R., Boppana, R., Krishnan, R., Reich, J., Wolff, T., Zachry, J.: Towards a discipline of mission-aware cloud computing. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW 2010, pp. 13\u201318. ACM, New York (2010)"},{"key":"47_CR14","unstructured":"Wojtczuk, R.: Subverting the Xen hypervisor. BlackHat USA (2008)"}],"container-title":["Lecture Notes in Computer Science","Euro-Par 2011: Parallel Processing Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29740-3_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T00:54:14Z","timestamp":1587344054000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29740-3_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642297397","9783642297403"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29740-3_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}