The Confinement Problem: 40 Years Later

Alex Crowell, Beng Heng Ng, Earlence Fernandes and Atul Prakash
Volume: 9, No: 2, Page: 189 ~ 204, Year: 2013
10.3745/JIPS.2013.9.2.189
Keywords: Confinement Problem, Covert Channels, Virtualization, Isolation, Taint Tracking
Full Text:

Abstract
The confinement problem was first noted four decades ago. Since then, a huge amount of efforts have been spent on defining and mitigating the problem. The evolution of technologies from traditional operating systems to mobile and cloud computing brings about new security challenges. It is perhaps timely that we review the work that has been done. We discuss the foundational principles from classical works, as well as the efforts towards solving the confinement problem in three domains: operating systems, mobile computing, and cloud computing. While common issues exist across all three domains, unique challenges arise for each of them, which we discuss.

Article Statistics
Multiple requests among the same broswer session are counted as one view (or download).
If you mouse over a chart, a box will show the data point's value.


Cite this article
IEEE Style
Alex Crowell, Beng Heng Ng, Earlence Fernandes and Atul Prakash, "The Confinement Problem: 40 Years Later," Journal of Information Processing Systems, vol. 9, no. 2, pp. 189~204, 2013. DOI: 10.3745/JIPS.2013.9.2.189.

ACM Style
Alex Crowell, Beng Heng Ng, Earlence Fernandes and Atul Prakash, "The Confinement Problem: 40 Years Later," Journal of Information Processing Systems, 9, 2, (2013), 189~204. DOI: 10.3745/JIPS.2013.9.2.189.