期刊文献+

基于虚拟机的信息系统结构安全研究 被引量:1

Study on structure safety of information system based on virtual machine
下载PDF
导出
摘要 为了利用虚拟机技术建立满足《信息系统安全等级保护基本要求GB/T 22239-2008》要求的信息系统网络结构,首先分析了虚拟机的六大安全风险,然后提出了一个管理中心一个物理资源池多个虚拟安全域、一个管理中心多个物理资源池多个虚拟安全域和多个管理中心多个物理资源池多个虚拟安全域等三种虚拟机部署模式,最后以信息系统的Web服务器、应用服务器和数据库服务器部署的安全域为主要因素,提出了基于这三种虚拟机部署模式的信息系统部署架构。这三种部署架构分别满足等级保护一、二、三级的结构安全要求。 In order to establish information system network structure satisfying "Information System Security Level Protection basic Demands(GB/T 22239-2008)" with virtual machine(VM), the six kinds of safety risk in VM are analyzed first. Then three VM deployment models are proposed, such as one management center(MC) one physical resource pool(PRP) multiple virtual safety domains(VSD), one MC multiple PRPs multiple VSDs, and multiple MCs multiple PRPs multiple VSDs. Finally, on the basis of the three VM deployment models, information system deployment architectures are presented in consideration of the safety domains of Web server, application server and database server. The three deployment architectures are respectively satisfied with the structure safety demands about the first level, the second level and the third level.
作者 彭淑芬
出处 《微型机与应用》 2015年第3期11-14,共4页 Microcomputer & Its Applications
关键词 虚拟机 安全域 信息系统 等级保护 结构安全 virtual machine safety domain information system level protection structure safety
  • 相关文献

参考文献6

二级参考文献91

  • 1刘谦,王观海,翁楚良,骆源,李明禄.A Mandatory Access Control Framework in Virtual Machine System with Respect to Multi-level Security Ⅱ:Implementation[J].China Communications,2011,8(2):86-94. 被引量:5
  • 2BINU A,KUMAR G S.Virtualization techniques:a methodical reviewof Xen and KVM[C]//Proc of the 1st International Conference onAdvances in Computing and Communications.Berlin:Springer-Verlag,2011:399-410. 被引量:1
  • 3WANG Xi,CHENG Chuan.Access control using trusted virtual ma-chine based on Xen[C]//Proc of International Conference on AppliedInformatics and Communication.Berlin:Springer-Verlag,2011:94-101. 被引量:1
  • 4SALAUN M.Practical overview of a Xen covert channel[J].Journalin Computer Virology,2010,6(4):317-328. 被引量:1
  • 5PRICE M.The paradox of security in virtual environments[J].Com-puter,2008,41(11):22-28. 被引量:1
  • 6IDC.New IDC IT cloud services survey:top benefits and challenges[EB/OL].(2009-11-15).http://blogs.idc.com/ie/?p=730. 被引量:1
  • 7BARHAM P,DRAGOVIC B,FRASER S,et al.Xen and the art ofvirtualization[C]//Proc of the 19th ACM Symposium on OperatingSystems Principles.New York:ACM Press,2003:164-177. 被引量:1
  • 8ZHANG Xiao-tao,DONG Yao-zu.Optimizing Xen VMM based on In-telvirtualization technology[C]//Proc of International Conferenceon Internet Computing in Science and Engineering.Washington DC:IEEE Computer Society,2008:367-374. 被引量:1
  • 9BRATUS S,LOCASTO M E,RAMASWAMY A,et al.Traps,events,emulation,and enforcement:managing the Yin and Yang of virtualiza-tion-based security[C]//Proc of the 1st ACM Workshop on VirtualMachine Security.New York:ACM Press,2008:49-58. 被引量:1
  • 10LIU Dong-xi,LEE J,JANG Ju-lian,et al.A cloud architecture of vir-tual trusted platform modules[C]//Proc of IEEE/IFIP InternationalConference on Embedded and Ubiquitous Computing.WashingtonDC:IEEE Computer Society,2010:804-811. 被引量:1

共引文献31

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部