2007
DOI: 10.21236/ada471608
|View full text |Cite
|
Sign up to set email alerts
|

Xenon Formal Security Policy Model

Abstract: Standard Form 298 (Rev. 8-98)Prescribed by ANSI Std. Z39.18Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Xenon is a high-assurance virtual machine monitor based on the Xen open-source hypervisor. We model the Xenon high-assurance virtual machine monitor's security policy … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2008
2008
2010
2010

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…For higher-assurance, the principle of least privilege is applied at the granularity of individual operations. Privilege for Xenon is defined with respect to the Xenon formal security policy model (McDermott et al, 2007). The policy is a two-part policy that defines both separation and allowable sharing.…”
Section: Least Privilegementioning
confidence: 99%
See 1 more Smart Citation
“…For higher-assurance, the principle of least privilege is applied at the granularity of individual operations. Privilege for Xenon is defined with respect to the Xenon formal security policy model (McDermott et al, 2007). The policy is a two-part policy that defines both separation and allowable sharing.…”
Section: Least Privilegementioning
confidence: 99%
“…For a more detailed explanation of the formal security policy model and its correspondence demonstration, see the NRL Memorandum Report (McDermott et al, 2007).…”
Section: Least Privilegementioning
confidence: 99%
“…In the Xenon project, we have defined a formal security policy [17] and we are constructing a formal specification of the hypervisor interface and its internal design. The formal security policy model uses the Circus formalism [18].…”
Section: Formal Specificationmentioning
confidence: 99%