Abstract
In this paper we present the design of an architecture for dynamic security monitoring and enforcement, based on software protection scheme, for client software running in Virtualized Environments. Monitoring mechanisms check a set of policy-defined conditions at runtime to detect threats or anomalous behaviour. Enforcement will be achieved using secure software execution methods that comply with the policies defined. The architecture presented allows for context adaptation of the policies defined using the language defined in PASSIVE. The automatic runtime enforcement of these policies is crucial to achieve real security in virtualized platforms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Steinberg, U., Kauer, B.: NOVA: a microhypervisor-based secure virtualization architecture. In: Proceedings of the 5th European Conference on Computer systems (EuroSys 2010), pp. 209–222. ACM, New York (2010)
Chowdhury, A., Meyers, S.: Facilitating Software Maintenance by Automated Detection of Constraint Violations, Tech. Rep. CS-93-37 Brown Univ. (1993)
Sellink, A., Verhoef, C.: An Architecture for Automated Software Maintenance. In: Proceedings of the 7th Intl. Workshop on Program Comprehension (1999)
Verhoef, C.: Towards automated modification of legacy assets. Annals of Software Engineering 9(1-4), 315–336 (2000)
van den Brand, M.G.J., Sellink, M.P.A., Verhoef, C.: Control flow normalization for COBOL/CICS legacy system. In: Proceedings of the 2nd Euromicro Conf. on Maintenance and Reengineering
Corritore, L., et al.: On-line trust: concepts, evolving themes, a model. Int. J. of Human-Computer Studies 58(6), 737–758 (2003)
Jøsang, A.: Trust and Reputation Systems. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2007. LNCS, vol. 4677, pp. 209–245. Springer, Heidelberg (2007)
McKnight, D.H., Chervany, N.L.: The Meanings of Trust. Technical Report MISRC Working Paper Series 96-04, University of Minnesota (1996)
Resnick, P., et al.: Reputation systems. Communications of the ACM 43(12), 45–48 (2000)
Spanoudakis, G.: Dynamic Trust Assessment of Software Services. In: Proc. of 2nd International Workshop on Service Oriented Software Engineering, IW-SOSE 2007 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Muñoz, A., Harjani, R., Maña, A., Díaz, R. (2011). Dynamic Security Monitoring and Accounting for Virtualized Environments. In: Lee, C., Seigneur, JM., Park, J.J., Wagner, R.R. (eds) Secure and Trust Computing, Data Management, and Applications. STA 2011. Communications in Computer and Information Science, vol 187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22365-5_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-22365-5_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22364-8
Online ISBN: 978-3-642-22365-5
eBook Packages: Computer ScienceComputer Science (R0)