Management of integrity-enforced virtual applications

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The security of virtualization platforms can be improved by applying trusted computing mechanisms such as enforcing the integrity of the hypervisor. In this paper we build on a recently proposed platform that extends this trust on to applications and services. We describe a process that covers the fully integrity-enforcing life-cycle of a trusted virtual application. Our architecture allows applications the safe transition between trusted states, even in case of updates of the hypervisor. We also detail the technical realization in our prototype implementation. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Gissing, M., Toegl, R., & Pirker, M. (2011). Management of integrity-enforced virtual applications. In Communications in Computer and Information Science (Vol. 187 CCIS, pp. 138–145). https://doi.org/10.1007/978-3-642-22365-5_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free