Abstract
Virtualization brings exibility to the data center and enables separations allowing for better security properties. For these security properties to be fully utilized, virtual machines need to be able to connect to secure services such as networking and storage. This paper addresses the problems associated with managing the cryptographic keys upon which such services rely by ensuring that keys remain within the trusted computing base. Here we describe a general architecture for managing keys tied to the underlying virtualized systems, with a specific example given for secure storage.
Publisher
Association for Computing Machinery (ACM)
Reference17 articles.
1. LNCS;Baldwin A.,2003
2. Enabling shared audit data
3. Xen and the art of virtualization
4. M. Bellare and B. Yee. Forward integrity for audit logs. Technical report UCSD tech report 1997. M. Bellare and B. Yee. Forward integrity for audit logs. Technical report UCSD tech report 1997.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献