Does Xen follow any security model like Random Oracle.i.e. If xen is really secure than is their any written proof or paper regarding xen''s security? -- RISHABH NAMDEO MT2009094 INTERNATIONAL INSTITUTE OF INFORMATION TECHNOLOGY BANGALORE _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel