{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:07:07Z","timestamp":1753884427791,"version":"3.41.2"},"reference-count":25,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,7,10]],"date-time":"2018-07-10T00:00:00Z","timestamp":1531180800000},"content-version":"vor","delay-in-days":190,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672411","U1401251"],"award-info":[{"award-number":["61672411","U1401251"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>With the development of cloud computing technology and the proliferation of the Internet of Things (IoT) terminals, more and more scenes need the collaboration of virtual machines and IoT terminals to resolve. However, there are many severe challenges on the security of virtual machines and IoT terminals. Based on Bell\u2010LaPadula Model (BLP), a task\u2010oriented multilevel cooperative access control scheme virtualization and reality BLP, named VR\u2010BLP, is proposed. Specifically, tasks are created for each user of the platform and tasks and users are divided into multiple levels to provide more granularities to limit access between virtual machines and IoT terminals. Moreover, with network isolation cooperating with process isolation and shared memory isolation mechanisms, VR\u2010BLP is implemented to enhance the security isolations between tasks. Performance evaluations show that VR\u2010BLP enhanced the security of environment with virtualization and IoT without causing significant performance penalty.<\/jats:p>","DOI":"10.1155\/2018\/5938152","type":"journal-article","created":{"date-parts":[[2018,7,10]],"date-time":"2018-07-10T23:36:21Z","timestamp":1531265781000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Task\u2010Oriented Multilevel Cooperative Access Control Scheme for Environment with Virtualization and IoT"],"prefix":"10.1155","volume":"2018","author":[{"given":"Jian","family":"Dong","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5853-633X","authenticated-orcid":false,"given":"Hui","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Song","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,7,10]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"crossref","unstructured":"KapilD. TyagiP. KumarS. andTamtaV. P. Cloud Computing: Overview and Research Issues Proceedings of the 2017 International Conference on Green Informatics (ICGI) August 2017 Fuzhou China 71\u201376 https:\/\/doi.org\/10.1109\/ICGI.2017.18.","DOI":"10.1109\/ICGI.2017.18"},{"key":"e_1_2_11_2_2","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.1203"},{"key":"e_1_2_11_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-3296-8"},{"key":"e_1_2_11_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.163"},{"key":"e_1_2_11_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_2_11_6_2","doi-asserted-by":"crossref","unstructured":"JainN.andChoudharyS. Overview of virtualization in cloud computing Proceedings of the 2016 Symposium on Colossal Data Analysis and Networking CDAN 2016 March 2016 2-s2.0-84992202529.","DOI":"10.1109\/CDAN.2016.7570950"},{"key":"e_1_2_11_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"e_1_2_11_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-013-1017-5"},{"key":"e_1_2_11_9_2","doi-asserted-by":"crossref","unstructured":"ThomasR. K.andSandhuR. S. Task-based authorization controls (TBAC): A Family of models for active and enterprise-oriented authorization management Proceedings of the IFIP WG11.3 Workshop on Database Security 1998 166\u2013181.","DOI":"10.1007\/978-0-387-35285-5_10"},{"key":"e_1_2_11_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2015.2444095"},{"key":"e_1_2_11_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2008.12.001"},{"key":"e_1_2_11_12_2","doi-asserted-by":"publisher","DOI":"10.1186\/1869-0238-4-5"},{"volume-title":"Secure Computer Systems: A Mathematical Model. Volume II","year":"1973","author":"Bell D.-E.","key":"e_1_2_11_13_2"},{"volume-title":"Secure computer systems: Mathematical foundations","year":"1973","author":"Bell D.-E.","key":"e_1_2_11_14_2"},{"key":"e_1_2_11_15_2","doi-asserted-by":"crossref","unstructured":"McCulloughD. Specifications for multi-level security and a hook-up Proceedings of the IEEE Symposium on Security and Privacy 1987.","DOI":"10.1109\/SP.1987.10009"},{"key":"e_1_2_11_16_2","doi-asserted-by":"crossref","unstructured":"ZhangN. LiM. LouW. andHouY. T. MUSHI: toward multiple level security cloud with strong hardware level isolation Proceedings of the 2012 IEEE Military Communications Conference MILCOM 2012 November 2012 Orlando FL USA 1\u20136 2-s2.0-84874298529.","DOI":"10.1109\/MILCOM.2012.6415698"},{"key":"e_1_2_11_17_2","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2013.820282"},{"key":"e_1_2_11_18_2","doi-asserted-by":"crossref","first-page":"232","DOI":"10.23919\/CJE.2014.10851904","article-title":"A multilevel security model for private cloud","volume":"23","author":"Haiwei X.","year":"2014","journal-title":"Chinese Journal of Electronics"},{"key":"e_1_2_11_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-011-0732-z"},{"key":"e_1_2_11_20_2","doi-asserted-by":"crossref","unstructured":"HeckmanM. R. SchellR. R. andReedE. E. A multi-level secure file sharing server and its application to a multi-level secure cloud Proceedings of the 34th Annual IEEE Military Communications Conference MILCOM 2015 October 2015 Tampa FL USA 1224\u20131229 2-s2.0-84959282431.","DOI":"10.1109\/MILCOM.2015.7357613"},{"key":"e_1_2_11_21_2","doi-asserted-by":"crossref","unstructured":"WrightC. CowanC. MorrisJ. SmalleyS. andKroah-HartmanG. Linux security modules: General security support for the Linux Kernel Proceedings of the Foundations of Intrusion Tolerant Systems OASIS 2003 213\u2013226 2-s2.0-57349162823.","DOI":"10.1109\/FITS.2003.1264934"},{"key":"e_1_2_11_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2014.2371999"},{"key":"e_1_2_11_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2013.6658648"},{"key":"e_1_2_11_24_2","doi-asserted-by":"crossref","unstructured":"GemberA. GrandlR. KhalidJ. andAkellaA. Design and implementation of a framework for software-defined middlebox networking 43 Proceedings of the ACM SIGCOMM Computer Communication Review August 2013 China 467\u2013468 2-s2.0-84891620284.","DOI":"10.1145\/2534169.2491686"},{"key":"e_1_2_11_25_2","unstructured":"UnixBench https:\/\/github.com\/kdlucas\/byte-unixbench."}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/5938152.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/5938152.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/5938152","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T17:54:25Z","timestamp":1751738065000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/5938152"}},"subtitle":[],"editor":[{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/5938152"],"URL":"https:\/\/doi.org\/10.1155\/2018\/5938152","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2018-03-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-06-23","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-07-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"5938152"}}