Show simple item record

dc.contributor.authorRoger Wright
dc.contributor.authorDavid J. Shifflett
dc.contributor.authorIrvine, Cynthia E.
dc.date1998
dc.date.accessioned2013-08-20T21:32:48Z
dc.date.available2013-08-20T21:32:48Z
dc.date.issued1998
dc.identifier.urihttps://hdl.handle.net/10945/35379
dc.descriptionProceedings of Fourteenth Computer Security Applications Conference, Phoenix, AZ. pp. 167--77, December 1998.en_US
dc.description.abstractWe describe security for a virtual heterogeneous machine (VHM). Our security architecture is based upon separation of services into four distinct domains. It is designed to take advantage of operating system support for domains, where available. We have chosen to use emerging public key technology as an interim solution to provide domain separation. A prototype demonstration of our architecture has been developed.en_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.titleSecurity Architecture for a Virtual Heterogeneous Machineen_US
dc.subject.authorNAen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record