- 1. IBM Virtual Machine Facility/370 : Control Program (CP) Logic, IBM Publication SY20-0880. May be obtained from IBM Corporation, Data Processing Division, 1133 Westchester Avenue, White Plains, New York, 10604.Google Scholar
- 2. IBM System/370 Principles of Operation, IBM Publication GA 22-7000. May be obtained from IBM Corporation, Data Processing Division, 1133 Westchester Avenue, White Plains, New York, 10604.Google Scholar
- 3. Attanasio, C. R., Markstein, P. W., Phillips, R. J., "Penetrating an Operating System: A Study of VM/370 Integrity," IBM Systems Journal, Volume 15, November 1, 1976, pp. 102-116.Google ScholarDigital Library
- 4. Donovan, J. J., Madnick, S. E., "Hierarchical Approach to Computer System Integrity," IBM Svstems Journal, Volume 14, Number 2, 1975, pp. 188-202.Google ScholarDigital Library
- 5. Weissman, Clark, "Secure Computer Operations with Virtual Partitioning, " AFIPS Conference Proceedings, Volume 44, National Computer Conference, 1975, pp. 929-934.Google Scholar
- 6. Belady, L. A., Weissman, C., "Experiments with Secure Resource Sharing for Virtual Machines," SDC SP-3769, May 1974. Also published in Proceedings on Protection in Operating Systems, Institute de Recherche d' Informatique et d'Automatique (IRIA), Colloques Internationaux, Rocquencourt, France, August 1974.Google Scholar
- 7. Gold, B., Linde, R., Schaefer, M., Scheid, J., "VM/370 Security Retrofit Program," The Proceedings of the National ACM Conference, October 1977. Google ScholarDigital Library
- 8. Lampson, B. W., "A Note on the confinement Problem," Communications of the ACM, October 1973, pp. 613-615. Google ScholarDigital Library
- 9. Linde, R. R., "Operating System Penetration," AFIPS Conference Proceedings, Volume 44, National Computer Conference, 1975, pp. 361-368.Google Scholar
- 10. Lampson, B. W., "Dynamic Protection Structures," AFIPS Conference Proceedings, Volume 35, 1969 FJCC, pp. 27-38.Google Scholar
- 11. Denning, D. E., "A Lattice Model of Secure Information Flow," CACM (19.5), May, 1976, p. 236-242. Google ScholarDigital Library
- 12. Denning, D., Denning, P. and Graham, G. S., "Selectively Confined Subsystems" Proceedings International Workshop on Protection in Operating Systems, IRIA, Colloques Internationaux, Rocquencourt, France, August, 1974, pp. 55-61.Google Scholar
- 13. Anderson, J. P., "Computer Security Technology Planning Study," ESD-TR-73-51, Volume I, October 1972.Google Scholar
- 14. Schiller, W. L., "The Design and Specification of a Security Kernel for the PDP-11/45," MITRE Technical Report, MITR-2934, March 1975.Google Scholar
- 15. Bell, E. D., LaPadula, L. D., "Secure Computer Systems : Mathematical Foundations," MITRE Technical Report Number 2547, 1 March 1973.Google Scholar
- Program confinement in KVM/370
Recommendations
KVM/ARM: the design and implementation of the linux ARM hypervisor
ASPLOS '14As ARM CPUs become increasingly common in mobile devices and servers, there is a growing demand for providing the benefits of virtualization for ARM-based devices. We present our experiences building the Linux ARM hypervisor, KVM/ARM, the first full ...
KVM/ARM: the design and implementation of the linux ARM hypervisor
ASPLOS '14: Proceedings of the 19th international conference on Architectural support for programming languages and operating systemsAs ARM CPUs become increasingly common in mobile devices and servers, there is a growing demand for providing the benefits of virtualization for ARM-based devices. We present our experiences building the Linux ARM hypervisor, KVM/ARM, the first full ...
KVM/ARM: the design and implementation of the linux ARM hypervisor
ASPLOS '14As ARM CPUs become increasingly common in mobile devices and servers, there is a growing demand for providing the benefits of virtualization for ARM-based devices. We present our experiences building the Linux ARM hypervisor, KVM/ARM, the first full ...
Comments