메뉴 건너뛰기




Volumn 15, Issue 3, 2006, Pages 229-245

Client-side access control enforcement using trusted computing and PEI models

Author keywords

Access control; Client side security enforcement; PEI models; Security framework; Trusted computing

Indexed keywords

ACCESS CONTROL; CLIENT-SIDE SECURITY ENFORCEMENT; PEI MODELS; SECURITY FRAMEWORK; TRUSTED COMPUTING;

EID: 33747846186     PISSN: 09266801     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (17)

References (30)
  • 1
    • 84858944500 scopus 로고    scopus 로고
    • Eros: The extremely reliable operating system, http://www.eros-os.org/ eros.html.
  • 2
    • 84858931124 scopus 로고    scopus 로고
    • Skype, http://www.skype.com.
  • 4
    • 84858932087 scopus 로고    scopus 로고
    • Trusted platform module (TPM) security policy, http://www. trustedcomputinggroup.org.
  • 5
  • 9
    • 30644465132 scopus 로고    scopus 로고
    • IBM Watson Research
    • TCPA resources, IBM Watson Research, http://www.research.ibm.com/gsal/ tcpa, 2003.
    • (2003) TCPA Resources
  • 13
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and Multics interpretation
    • The Mitre Corporation, Bedford, MA, March
    • D.E. Bell and L.J. LaPadula, Secure computer systems: Unified exposition and Multics interpretation, Technical Report ESD-TR-75-306, The Mitre Corporation, Bedford, MA, March 1975.
    • (1975) Technical Report , vol.ESD-TR-75-306
    • Bell, D.E.1    LaPadula, L.J.2
  • 18
    • 17544394392 scopus 로고    scopus 로고
    • Computer security in the real world
    • B. Lampson, Computer security in the real world, IEEE Computer (6) (2004), 37-46.
    • (2004) IEEE Computer , Issue.6 , pp. 37-46
    • Lampson, B.1
  • 20
    • 0003505824 scopus 로고
    • Digital Press
    • H. Levy, Capability-based computer systems, Digital Press, 1984, Available at http://www.cs.washington.edu/homes/levy/capabook/index.html.
    • (1984) Capability-based Computer Systems
    • Levy, H.1
  • 21
    • 2442425355 scopus 로고    scopus 로고
    • Integrating flexible support for security policies into the Linux operating system
    • P. Loscocco and S. Smalley, Integrating flexible support for security policies into the Linux operating system, in: Proceedings of USENIX Annual Technical Conference, 2001, pp. 29-42.
    • (2001) Proceedings of USENIX Annual Technical Conference , pp. 29-42
    • Loscocco, P.1    Smalley, S.2
  • 23
    • 84949486483 scopus 로고    scopus 로고
    • Binding identities and attributes using digitally signed certificates
    • New Orleans, LA, USA
    • J.S. Park and R. Sandhu, Binding identities and attributes using digitally signed certificates, in: Proceedings Annual Computer Security Applications Conference, New Orleans, LA, USA, 2000, pp. 120-127.
    • (2000) Proceedings Annual Computer Security Applications Conference , pp. 120-127
    • Park, J.S.1    Sandhu, R.2
  • 25
    • 29244450159 scopus 로고    scopus 로고
    • Property-based attestation for computing platforms: Caring about properties, not mechanisms
    • NS, Canada
    • A. Sadeghi and C. Stuble, Property-based attestation for computing platforms: Caring about properties, not mechanisms, in: Proceedings of New Security Paradigms Workshop, NS, Canada, 2004, pp. 67-77.
    • (2004) Proceedings of New Security Paradigms Workshop , pp. 67-77
    • Sadeghi, A.1    Stuble, C.2
  • 27
    • 30644461987 scopus 로고
    • Information protection and the control of sharing in the Multics system
    • J.H. Saltzer, Information protection and the control of sharing in the Multics system, Communications of the ACM 17(7) (1974).
    • (1974) Communications of the ACM , vol.17 , Issue.7
    • Saltzer, J.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.