메뉴 건너뛰기




Volumn 3108, Issue , 2004, Pages 86-97

NGSCB: A trusted open system

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; COMMERCE; COMPUTER PRIVACY; SECURITY OF DATA;

EID: 33646445517     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-27800-9_8     Document Type: Article
Times cited : (55)

References (28)
  • 11
    • 0020778471 scopus 로고
    • Scomp: A solution to the multilevel security problem
    • L. Fraim. Scomp: A solution to the multilevel security problem. IEEE Computer, 16:26-34, 1983.
    • (1983) IEEE Computer , vol.16 , pp. 26-34
    • Fraim, L.1
  • 16
    • 35048895544 scopus 로고    scopus 로고
    • http://research.microsoft.com/research/pubs/.
  • 19
    • 21644444664 scopus 로고    scopus 로고
    • Technical Report UNSW-CSE-TR-0303, University of New South Wales
    • B. Leslie and G. Heiser. Towards untrusted device drivers. Technical Report UNSW-CSE-TR-0303, University of New South Wales, 2003.
    • (2003) Towards Untrusted Device Drivers
    • Leslie, B.1    Heiser, G.2
  • 23
    • 0016082273 scopus 로고
    • Formal requirements for virtualizable third generation architectures
    • G. Popek and R. Goldberg. Formal requirements for virtualizable third generation architectures. Communications of the ACM, 17(7):412-421, 1974.
    • (1974) Communications of the ACM , vol.17 , Issue.7 , pp. 412-421
    • Popek, G.1    Goldberg, R.2
  • 24
    • 85084161596 scopus 로고    scopus 로고
    • Analysis of the Intel Pentium's ability to support a secure virtual machine monitor
    • USENIX Association
    • J. Robin and C. Irvine. Analysis of the Intel Pentium's ability to support a secure virtual machine monitor. In Proceedings of the 9th USENIX Security Symposium (SECURITY-00), pages 129-144. The USENIX Association, 2000.
    • (2000) Proceedings of the 9th USENIX Security Symposium (SECURITY-00) , pp. 129-144
    • Robin, J.1    Irvine, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.