The Confinement Problem: 40 Years Later


Alex Crowell, Beng Heng Ng, Earlence Fern, es, Atul Prakash, Journal of Information Processing Systems Vol. 9, No. 2, pp. 189-204, Apr. 2013  

10.3745/JIPS.2013.9.2.189
Keywords: Confinement Problem, Covert Channels, Virtualization, Isolation, Taint Tracking
Fulltext:

Abstract

The confinement problem was first noted four decades ago. Since then, a huge amount of efforts have been spent on defining and mitigating the problem. The evolution of technologies from traditional operating systems to mobile and cloud computing brings about new security challenges. It is perhaps timely that we review the work that has been done. We discuss the foundational principles from classical works, as well as the efforts towards solving the confinement problem in three domains: operating systems, mobile computing, and cloud computing. While common issues exist across all three domains, unique challenges arise for each of them, which we discuss.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Alex Crowell, Beng Heng Ng, Earlence Fern, es, & Atul Prakash (2013). The Confinement Problem: 40 Years Later. Journal of Information Processing Systems, 9(2), 189-204. DOI: 10.3745/JIPS.2013.9.2.189.

[IEEE Style]
A. Crowell, B. H. Ng, E. Fern, es and A. Prakash, "The Confinement Problem: 40 Years Later," Journal of Information Processing Systems, vol. 9, no. 2, pp. 189-204, 2013. DOI: 10.3745/JIPS.2013.9.2.189.

[ACM Style]
Alex Crowell, Beng Heng Ng, Earlence Fern, es, and Atul Prakash. 2013. The Confinement Problem: 40 Years Later. Journal of Information Processing Systems, 9, 2, (2013), 189-204. DOI: 10.3745/JIPS.2013.9.2.189.