This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Lessons from VAX/SVS for High-Assurance VM Systems
Nov.-Dec. 2012 (vol. 10 no. 6)
pp. 26-35
Steve Lipner, Microsoft
Trent Jaeger, Pennsylvania State University
Mary Ellen Zurko, Cisco Systems
The authors take a look back at VAX/SVS, a high-assurance virtual machine monitor (VMM) project from the 1980s, extracting its most pertinent lessons, including reference monitor architectural principles, approaches to verifiable and tamperproof access control, the benefits of layering, the impacts of minimization and verification, and the reasons behind its cancellation.
Index Terms:
Virtual machines,Access control,Monitoring,Privacy,Virtual machining,Information security,Computer security,VMM,security kernels,verification,assurance,VAX/SVS,virtual machine monitor
Citation:
Steve Lipner, Trent Jaeger, Mary Ellen Zurko, "Lessons from VAX/SVS for High-Assurance VM Systems," IEEE Security & Privacy, vol. 10, no. 6, pp. 26-35, Nov.-Dec. 2012, doi:10.1109/MSP.2012.87
Usage of this product signifies your acceptance of the Terms of Use.