1979 International Workshop on Managing Requirements Knowledge (MARK) 1979
DOI: 10.1109/mark.1979.8817181
|View full text |Cite
|
Sign up to set email alerts
|

A security retrofit of VM/370

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

1985
1985
2010
2010

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 24 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…It was found that this led to systems that by and large were extremely inefficient, for diminishing returns in simplicity. Reported experience with these systems, especially those to kernelize the already svelte VM370 [17] in the form of KVM370 [31,51], led us to believe that the VMM represents a least common denominator for virtualization, simplification beyond which yields little additional benefit [30].…”
Section: Related Workmentioning
confidence: 99%
“…It was found that this led to systems that by and large were extremely inefficient, for diminishing returns in simplicity. Reported experience with these systems, especially those to kernelize the already svelte VM370 [17] in the form of KVM370 [31,51], led us to believe that the VMM represents a least common denominator for virtualization, simplification beyond which yields little additional benefit [30].…”
Section: Related Workmentioning
confidence: 99%
“…Communications control, Security, or Interprocess control) Security kernels ( Ames, 1983) evolved from the concept of a monitor that checks privileges and system status variables before permitting access to processes. Several kernels have been developed over the last decade including a kernelized V1L'370 ( Gold, 1979), Kernelized Secure Operating System ( KSOS) (Berson, 1979 andMcCauley andDrongowski, 1979), a kernel by the MITRE Corporation for a DEC PDP 11/45 and one called UCLA data secure UNIX other, 1979 andWalker, 1980). These and other security kernel implementations and designs are outlined in Table 4.2(a) and Table 4.2(b) ( an adaptation of one given by Landwehr ( 1983)).…”
Section: Verifiable Implementation Approachesmentioning
confidence: 99%