메뉴 건너뛰기




Volumn 37, Issue 5, 2003, Pages 178-192

Implementing an untrusted operating system on trusted hardware

Author keywords

Untrusted Operating Systems; XOM; XOMOS

Indexed keywords

CODES (SYMBOLS); COMPUTER HARDWARE; COMPUTER SIMULATION; COMPUTER SOFTWARE; DATA REDUCTION; PROGRAM PROCESSORS; SIGNAL PROCESSING;

EID: 21644458439     PISSN: 01635980     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1165389.945463     Document Type: Conference Paper
Times cited : (129)

References (29)
  • 5
    • 0004181422 scopus 로고    scopus 로고
    • AES proposal: Rijndael
    • National Institute of Standards and Technology (NIST), Mar.
    • J. Daemen and V. Rijmen. AES proposal: Rijndael. Technical report, National Institute of Standards and Technology (NIST), Mar. 2000. Available at http://csrc.nist.gov/encryption/aes/round2/r2algs.htm.
    • (2000) Technical Report
    • Daemen, J.1    Rijmen, V.2
  • 6
    • 21644488594 scopus 로고    scopus 로고
    • Digital rights management operating system. U.S. Patent 6,330,670, Dec.
    • P. England, J. DeTreville, and B. Lampson. Digital rights management operating system. U.S. Patent 6,330,670, Dec. 2001.
    • (2001)
    • England, P.1    Detreville, J.2    Lampson, B.3
  • 7
    • 21644481168 scopus 로고    scopus 로고
    • Loading and identifying a digital rights management operating system. U.S. Patent 6,327,652. Dec.
    • P. England, J. DeTreville, and B. Lampson. Loading and identifying a digital rights management operating system. U.S. Patent 6,327,652. Dec. 2001.
    • (2001)
    • England, P.1    Detreville, J.2    Lampson, B.3
  • 11
    • 0033221778 scopus 로고    scopus 로고
    • Hardware security for software privacy support
    • Nov.
    • T. Gilmont, J. Legat, and J. Quisquater. Hardware security for software privacy support. Electronics Letters, 35(24):2096-2097, Nov. 1999.
    • (1999) Electronics Letters , vol.35 , Issue.24 , pp. 2096-2097
    • Gilmont, T.1    Legat, J.2    Quisquater, J.3
  • 14
    • 0038650645 scopus 로고    scopus 로고
    • The TrustNo1 cryptoprocessor concept
    • Purdue University, Apr.
    • M. Kuhn. The TrustNo1 cryptoprocessor concept. Technical Report CS555, Purdue University, Apr. 1997.
    • (1997) Technical Report CS555
    • Kuhn, M.1
  • 20
    • 84860968802 scopus 로고    scopus 로고
    • OpenSSL, 2003. http://www.openssl.org.
    • (2003)
  • 21
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Feb.
    • R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(18):120-126, Feb. 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.18 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 23
    • 85041481084 scopus 로고
    • Design and verification of secure systems
    • Dec.
    • J. Rushby. Design and verification of secure systems. ACM Operating Systems Review, SIGOPS, 15(5):12-21, Dec. 1981.
    • (1981) ACM Operating Systems Review, SIGOPS , vol.15 , Issue.5 , pp. 12-21
    • Rushby, J.1
  • 24
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Sept.
    • J. Saltzer and M. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, Sept. 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 25
    • 84860960598 scopus 로고    scopus 로고
    • May
    • SGI IRIX 6.5: Home Page, May 2003. http://www.sgi.com/software/irix6.5.
    • (2003) SGI IRIX 6.5: Home Page
  • 27
    • 84958045366 scopus 로고    scopus 로고
    • Using a high-performance, programmable secure coprocessor
    • Feb.
    • S. W. Smith, E. R. Palmer, and S. Weingart. Using a high-performance, programmable secure coprocessor. In Financial Cryptography, pages 73-89, Feb. 1998.
    • (1998) Financial Cryptography , pp. 73-89
    • Smith, S.W.1    Palmer, E.R.2    Weingart, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.