Issue No.06 - Nov.-Dec. (2012 vol.10)
Steve Lipner , Microsoft
Trent Jaeger , Pennsylvania State University
Mary Ellen Zurko , Cisco Systems
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2012.87
The authors take a look back at VAX/SVS, a high-assurance virtual machine monitor (VMM) project from the 1980s, extracting its most pertinent lessons, including reference monitor architectural principles, approaches to verifiable and tamperproof access control, the benefits of layering, the impacts of minimization and verification, and the reasons behind its cancellation.
Virtual machines, Access control, Monitoring, Privacy, Virtual machining, Information security, Computer security, VMM, security kernels, verification, assurance, VAX/SVS, virtual machine monitor
Steve Lipner, Trent Jaeger, Mary Ellen Zurko, "Lessons from VAX/SVS for High-Assurance VM Systems", IEEE Security & Privacy, vol.10, no. 6, pp. 26-35, Nov.-Dec. 2012, doi:10.1109/MSP.2012.87