Locking the sky: a survey on IaaS cloud security

LM Vaquero, L Rodero-Merino, D Morán - Computing, 2011 - Springer
Cloud computing is expected to become a common solution for deploying applications
thanks to its capacity to leverage developers from infrastructure management tasks, thus …

Separation virtual machine monitors

J McDermott, B Montrose, M Li, J Kirby… - Proceedings of the 28th …, 2012 - dl.acm.org
Separation kernels are the strongest known form of separation for virtual machines. We
agree with NSA's Information Assurance Directorate that while separation kernels are …

Model checking distributed mandatory access control policies

P Alexander, L Pike, P Loscocco, G Coker - ACM Transactions on …, 2015 - dl.acm.org
This work examines the use of model checking techniques to verify system-level security
properties of a collection of interacting virtual machines. Specifically, we examine how local …

TSAC: Enforcing Isolation ofVirtual Machines in Clouds

C Weng, J Zhan, Y Luo - IEEE Transactions on Computers, 2014 - ieeexplore.ieee.org
Virtualization plays a vital role in building the infrastructure of clouds, and isolation is
considered as one of its important features. However, we demonstrate with practical …

Mandatory access protection within cloud systems

M Blanc, A Bousquet, J Briffaut, L Clévy, D Gros… - Security, Privacy and …, 2013 - Springer
In order to guarantee security properties, such as confidentiality and integrity, cryptographic
mechanisms provide encryption and signature of data, but protection is required to control …

Piga-virt: an advanced distributed mac protection of virtual systems

J Briffaut, E Lefebvre, J Rouzaud-Cornabas… - Euro-Par 2011: Parallel …, 2012 - Springer
Abstract Efficient Mandatory Access Control of Virtual Machines remains an open problem
for protecting efficiently Cloud Systems. For example, the MAC protection must allow some …

MAC protection of the OpenNebula Cloud environment

Z Afoulki, A Bousquet, J Briffaut… - … Conference on High …, 2012 - ieeexplore.ieee.org
Mandatory Access Control is really poorly supported by Cloud environments. Our paper
proposes extensions of the OpenNebula Cloud software in order to provide an advanced …

The Xenon separation VMM: Secure virtualization infrastructure for military clouds

J McDermott, B Montrose, M Li, J Kirby… - MILCOM 2012-2012 …, 2012 - ieeexplore.ieee.org
In conventional military computing, security separation is provided by cryptography, for data
in motion and data at rest. Security separation for data under computation is provided by …

TwinPorter-An Architecture For Enabling the Live Migration of VMI-Based Monitored Virtual Machines

B Taubmann, A Böhm, HP Reiser - 2019 18th IEEE …, 2019 - ieeexplore.ieee.org
Virtual machine introspection has evolved into a valuable tool for several purposes such as
incident analysis and intrusion detection. In addition to that, there has been a lot of work that …

[HTML][HTML] Automated Security Analysis of Virtualized Infrastructures

S Bleikertz - 2017 - tuprints.ulb.tu-darmstadt.de
Virtualization enables the increasing efficiency and elasticity of modern IT infrastructures,
including Infrastructure as a Service. However, the operational complexity of virtualized …