首页> 外文期刊>ACM Computing Surveys >A Study of Security Isolation Techniques
【24h】

A Study of Security Isolation Techniques

机译:安全隔离技术研究

获取原文
获取原文并翻译 | 示例
       

摘要

Security isolation is a foundation of computing systems that enables resilience to different forms of attacks. This article seeks to understand existing security isolation techniques by systematically classifying different approaches and analyzing their properties. We provide a hierarchical classification structure for grouping different security isolation techniques. At the top level, we consider two principal aspects: mechanism and policy. Each aspect is broken down into salient dimensions that describe key properties. We break the mechanism into two dimensions, enforcement location and isolation granularity, and break the policy aspect down into three dimensions: policy generation, policy configurability, and policy lifetime. We apply our classification to a set of representative articles that cover a breadth of security isolation techniques and discuss tradeoffs among different design choices and limitations of existing approaches.
机译:安全隔离是计算系统的基础,它可以抵御各种形式的攻击。本文试图通过系统地分类不同的方法并分析其特性来了解现有的安全隔离技术。我们提供了一种分层的分类结构,用于对不同的安全隔离技术进行分组。在顶层,我们考虑两个主要方面:机制和政策。每个方面都分为描述关键属性的显着维度。我们将机制分为两个维度,即执行位置和隔离粒度,并将策略方面分为三个维度:策略生成,策略可配置性和策略生存期。我们将分类应用于一组涵盖广泛的安全隔离技术的代表性文章,并讨论不同设计选择之间的权衡和现有方法的局限性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号