You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: development.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ permalink: /development/
6
6
7
7
Please read the [contribution](https://github.com/OpenXT/openxt/wiki/Contributing) guidelines. There are 50+ source repositories on [Github](https://github.com/openxt), with [build instructions](https://github.com/OpenXT/openxt/wiki/How%20to%20build%20OpenXT). Issues and enhancements are tracked in [JIRA](https://openxt.atlassian.net).
8
8
9
-
The documents below are dated, especially with respect to video architecture, but may be useful to new developers. They need to be converted to the Github wiki and edited to revise or remove dated sections.
9
+
The documents below are dated, especially with respect to video architecture, but may be useful to new developers. They will be converted to the Github wiki and edited to revise or remove dated sections.
Copy file name to clipboardExpand all lines: history.md
+45-13Lines changed: 45 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,36 +6,47 @@ permalink: /history/
6
6
7
7
## Ecosystem
8
8
9
-
2014 LinuxCon NA, [Security in the Cloud: Xen, KVM, Containers](http://www.slideshare.net/xen_com_mgr/lcna14-security-of-virtualization-solutions), *George Dunlap*
9
+
2014
10
10
11
-
2014 Xen Summit, [Security and the Properties of a Xen Virtualization Platform](http://www.slideshare.net/xen_com_mgr/tricca-xen-summit2014), *Philip Tricca*.
11
+
* LinuxCon NA, [Security in the Cloud: Xen, KVM, Containers](http://www.slideshare.net/xen_com_mgr/lcna14-security-of-virtualization-solutions), *George Dunlap*
12
12
13
-
2013 LinuxCon EU, [Securing your cloud with Xen's advanced security features](http://www.slideshare.net/xen_com_mgr/lceu13-securing-your-cloud-with-xens-advanced-security-features-ge), *George Dunlap* ([video](http://www.youtube.com/watch?v=fvW3kzl-bfY))
13
+
* Xen Summit, [Security and the Properties of a Xen Virtualization Platform](http://www.slideshare.net/xen_com_mgr/tricca-xen-summit2014), *Philip Tricca*.
> Micro-Virtualization, Type-2 Hypervisor, VM Fork, Deprivileged Windows Host
24
30
25
-
2012 Xen Summit, [Xen and Client Virtualization: the case of XenClient XT](http://www.slideshare.net/xen_com_mgr/xen-and-client-virtualization-the-case-of-xenclient-xt), *Gianluca Guida*
31
+
* Xen Summit, [Xen and Client Virtualization: the case of XenClient XT](http://www.slideshare.net/xen_com_mgr/xen-and-client-virtualization-the-case-of-xenclient-xt), *Gianluca Guida*
26
32
27
33
> Client Virtualization, VPN VM, Linux Stub Domains, Graphics Virtualization, Inter-VM Communication, SE Linux, Xen Security Modules (XSM), Dynamic Root of Trust Measurement (DRTM), Service VMs, Intel VT-d, Intel TXT.
28
34
29
-
2010 [Qubes OS Architecture](http://files.qubes-os.org/files/doc/arch-spec-0.3.pdf), *Joanna Rutkowska*
35
+
2010
36
+
37
+
*[Qubes OS Architecture](http://files.qubes-os.org/files/doc/arch-spec-0.3.pdf), *Joanna Rutkowska*
2011 ACM Symposium on Operating Systems Principles, [Breaking Up is Hard to Do: Security and Functionality in a Commodity Hypervisor](http://www.cs.ubc.ca/~andy/papers/xoar-sosp-final.pdf), *Patrick Colp et al.*
47
+
2011
48
+
49
+
* ACM Symposium on Operating Systems Principles, [Breaking Up is Hard to Do: Security and Functionality in a Commodity Hypervisor](http://www.cs.ubc.ca/~andy/papers/xoar-sosp-final.pdf), *Patrick Colp et al.*
39
50
40
51
> "We present Xoar, a modified version of Xen that retrofits the modularity and
41
52
isolation principles used in microkernels onto a mature virtualization platform.
@@ -45,14 +56,35 @@ benefits: sharing of service components by guests is configurable and auditable,
45
56
making exposure to risk explicit, and access to the hypervisor is restricted
46
57
to the least privilege required for each component."
47
58
48
-
2008 ACM Conference on Virtual Execution Environments, [Improving Xen Security through Disaggregation](https://www.cl.cam.ac.uk/research/srg/netos/papers/2008-murray2008improving.pdf), *Derek Murray et al.*
59
+
2008
60
+
61
+
* ACM Conference on Virtual Execution Environments, [Improving Xen Security through Disaggregation](https://www.cl.cam.ac.uk/research/srg/netos/papers/2008-murray2008improving.pdf), *Derek Murray et al.*
49
62
50
63
> "We introduce our work to disaggregate the management virtual machine
51
64
in a Xen-based system ... moves
52
65
the domain builder, the most important privileged component, into a minimal
53
66
trusted compartment. We illustrate how this approach may be used to implement
54
67
“trusted virtualisation” and improve the security of virtual TPM implementations.
55
68
56
-
2006 USENIX Security, [Virtualizing the trusted platform module](https://www.usenix.org/event/sec06/tech/full_papers/berger/berger.pdf), *Stefan Berger et al.*
69
+
2007
70
+
71
+
* ACM Workshop on New Security Paradigms, [Robustly Secure Computer Systems: A new security paradigm of system discontinuity](http://parsys.eecs.uic.edu/~solworth/solworth07systemDiscontinuity.pdf), *Jon A. Solworth*
72
+
73
+
2006
74
+
75
+
**Computer* magazine, [Can We Make Operating Systems Reliable and Secure?](http://www.cs.vu.nl/~ast/publications/computer-2006a.pdf), *Andrew S. Tanenbaum et al.*
76
+
* USENIX Security, [Virtualizing the Trusted Platform Module](https://www.usenix.org/event/sec06/tech/full_papers/berger/berger.pdf), *Stefan Berger et al.*
77
+
78
+
2003
79
+
80
+
* ACM Symposium on Operating Systems Principles, [Xen and the Art of Virtualization](http://www.cl.cam.ac.uk/research/srg/netos/papers/2003-xensosp.pdf), *Paul Barham et al.*
81
+
82
+
> "This paper presents Xen, an x86 virtual machine monitor which allows multiple commodity operating systems to share conventional hardware in a safe and resource managed fashion, but without sacricing either performance or functionality."
83
+
84
+
1998
85
+
86
+
* USENIX Security, [The Flask Security Architecture: System Support for Diverse Security Policies](https://www.cs.cmu.edu/~dga/papers/flask-usenixsec99.pdf), *Ray Spencer et al.*
87
+
88
+
1981
57
89
58
-
1998 USENIX Security, [The flask security architecture: System support for diverse security policies](https://www.cs.cmu.edu/~dga/papers/flask-usenixsec99.pdf), *Ray Spencer et al.*
90
+
* IBM Journal of Research & Development, [The Origin of the VM/370 Time-sharing System](http://lass.cs.umass.edu/~shenoy/courses/fall07/papers/vm370.pdf), *R.J. Creasy*
> "... is an open platform for developers and sysadmins to build, ship, and run distributed applications ... Docker enables apps to be quickly assembled from components and eliminates the friction between development, QA, and production environments."
> "... provides stronger security services which are more resistant to attack and abstractions which are less prone to abuse by attackers. As an example of the former, all networking in Ethos is encrypted, authenticated, and authorized. As an example of the latter, Ethos I/O is typed (as in programming languages) ensuring that I/O conforms to declared typed and thus preventing many attacks based on ill-formed input."
46
+
> "... provides stronger security services which are more resistant to attack and abstractions which are less prone to abuse by attackers. As an example of the former, all networking in Ethos is encrypted, authenticated, and authorized. As an example of the latter, Ethos I/O is typed (as in programming languages) ensuring that I/O conforms to declared types and thus preventing many attacks based on ill-formed input."
40
47
41
48
+[U of Illinois Research](https://www.ethos-os.org/), *USA*
0 commit comments