Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2015 (2015), Article ID 841292, 9 pages
http://dx.doi.org/10.1155/2015/841292
Research Article

V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service

State Key Laboratory of Integrated Services Networks, Xidian University, No. 2 South Taibai Road, Yanta District, Xi’an 710071, China

Received 29 August 2014; Accepted 1 September 2014

Academic Editor: David Taniar

Copyright © 2015 Hui Zhu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. H. Zhu, Y. Xue, Y. Zhang, X. Chen, H. Li, and X. Liu, “V-MLR: a multilevel security model for virtualization,” in Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS '13), pp. 9–16, IEEE, September 2013. View at Publisher · View at Google Scholar · View at Scopus
  2. A. Flahive, D. Taniar, and W. Rahayu, “Ontology as a Service (OaaS): a case for sub-ontology merging on the cloud,” The Journal of Supercomputing, vol. 65, no. 1, pp. 185–216, 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. D. Taniar and S. Goel, “Concurrency control issues in Grid databases,” Future Generation Computer Systems, vol. 23, no. 1, pp. 154–162, 2007. View at Publisher · View at Google Scholar · View at Scopus
  4. S. Goel, H. Sharda, and D. Taniar, “Replica synchronisation in grid databases,” InternationalJournal of Web and Grid Services, vol. 1, no. 1, pp. 87–112, 2005. View at Google Scholar
  5. D. Taniar, C. H. Leung, W. Rahayu, and S. Goel, High Performance Parallel Database Processing and Grid Databases, vol. 67, John Wiley & Sons, 2008.
  6. A. Flahive, D. Taniar, and W. Rahayu, “Ontology as a Service (OaaS): extracting and replacing sub-ontologies on the cloud,” Cluster Computing, vol. 16, no. 4, pp. 947–960, 2013. View at Publisher · View at Google Scholar · View at Scopus
  7. S. Shukla and R. Kumar Singh, “Security of cloud computing system using object oriented technique,” in Proceedings of the 3rd International Conference on Computing, Communication and Networking Technologies (ICCCNT '12), 9, p. 1, IEEE, July 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. H. Zhu, T. Liu, G. Wei, and H. Li, “PPAS: privacy protection authentication scheme for VANET,” Cluster Computing, vol. 16, no. 4, pp. 873–886, 2013. View at Publisher · View at Google Scholar · View at Scopus
  9. F. Sabahi, “Cloud computing security threats and responses,” in Proceedings of the IEEE 3rd International Conference on Communication Software and Networks (ICCSN '11), pp. 245–249, 2011.
  10. C. Li, A. Raghunathan, and N. K. Jha, “A trusted virtual machine in an untrusted management environment,” IEEE Transactions on Services Computing, vol. 5, no. 4, pp. 472–483, 2012. View at Publisher · View at Google Scholar · View at Scopus
  11. S. M. Bellovin, “Virtual machines, virtual security?” Communications of the ACM, vol. 49, no. 10, p. 104, 2006. View at Publisher · View at Google Scholar · View at Scopus
  12. J. E. Smith and R. Nair, “The architecture of virtual machines,” Computer, vol. 38, no. 5, pp. 32–38, 2005. View at Publisher · View at Google Scholar · View at Scopus
  13. R. Sailer, T. Jaeger, E. Valdez et al., “Building a MAC-based security architecture for the Xen open-source hypervisor,” in Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC '05), pp. 276–285, December 2005. View at Publisher · View at Google Scholar · View at Scopus
  14. G. Cheng, H. Jin, D. Zou, A. K. Ohoussou, and F. Zhao, “A prioritized chinese wall model for managing the covert information flows in virtual machine systems,” in Proceedings of the 9th International Conference for Young Computer Scientists (ICYCS '08), pp. 1481–1487, November 2008. View at Publisher · View at Google Scholar · View at Scopus
  15. M. Hirano, T. Shinagawa, H. Eiraku et al., “Introducing role-based access control to a secure virtual machine monitor: security policy enforcement mechanism for distributed computers,” in Proceedings of the IEEE Asia-Pacific Services Computing Conference (APSCC '08), pp. 1225–1230, IEEE, 2008. View at Publisher · View at Google Scholar · View at Scopus
  16. Q. Liu, G. Wang, C. Weng, Y. Luo, and M. Li, “A mandatory access control framework in virtual machine system with respect to multi-level security I: theory,” China Communications, vol. 7, no. 4, pp. 137–143, 2010. View at Google Scholar · View at Scopus
  17. D. E. Bell and L. J. La Padula, “Secure computer system: unified exposition and multics interpretation,” DTIC Document, 1976. View at Google Scholar
  18. D. E. Bell and L. J. LaPadula, “Secure computer systems: mathematical foundations,” Tech. Rep., DTIC, 1973. View at Google Scholar
  19. T. F. Lunt, D. E. Denning, R. R. Schell, M. Heckman, and W. R. Shockley, “SeaView security model,” IEEE Transactions on Software Engineering, vol. 16, no. 6, pp. 593–607, 1990. View at Publisher · View at Google Scholar · View at Scopus
  20. R. Sandhu and F. Chen, “The multilevel relational (MLR) data model,” ACM Transactions on Information and System Security, vol. 1, no. 1, pp. 93–132, 1998. View at Publisher · View at Google Scholar
  21. X. Chen, J. Li, and W. Susilo, “Efficient fair conditional payments for outsourcing computations,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1687–1694, 2012. View at Publisher · View at Google Scholar · View at Scopus