-
1
-
-
84858944500
-
-
Eros: The extremely reliable operating system, http://www.eros-os.org/ eros.html.
-
-
-
-
2
-
-
84858931124
-
-
Skype, http://www.skype.com.
-
-
-
-
4
-
-
84858932087
-
-
Trusted platform module (TPM) security policy, http://www. trustedcomputinggroup.org.
-
-
-
-
5
-
-
18744415544
-
Adding trusted operating system features to FreeBSD
-
Boston, MA, USA
-
TrustedBSD: Adding trusted operating system features to FreeBSD, in: Proceedings of the FREENIX Track: USENIX Annual Technical Conference, Boston, MA, USA, 2001, pp. 15-28.
-
(2001)
Proceedings of the FREENIX Track: USENIX Annual Technical Conference
, pp. 15-28
-
-
-
9
-
-
30644465132
-
-
IBM Watson Research
-
TCPA resources, IBM Watson Research, http://www.research.ibm.com/gsal/ tcpa, 2003.
-
(2003)
TCPA Resources
-
-
-
12
-
-
1142270162
-
-
Prentice Hall PTR
-
B. Balacheff, L. Chen, S. Pearson, D. Plaquin and G. Proudler, Trusted Computing Platforms: TCPA Technology in Context, Prentice Hall PTR, 2003.
-
(2003)
Trusted Computing Platforms: TCPA Technology in Context
-
-
Balacheff, B.1
Chen, L.2
Pearson, S.3
Plaquin, D.4
Proudler, G.5
-
13
-
-
0003400251
-
Secure computer systems: Unified exposition and Multics interpretation
-
The Mitre Corporation, Bedford, MA, March
-
D.E. Bell and L.J. LaPadula, Secure computer systems: Unified exposition and Multics interpretation, Technical Report ESD-TR-75-306, The Mitre Corporation, Bedford, MA, March 1975.
-
(1975)
Technical Report
, vol.ESD-TR-75-306
-
-
Bell, D.E.1
LaPadula, L.J.2
-
14
-
-
14844295011
-
Direct anonymous attestation
-
Washington, DC, USA
-
E. Brickell, J. Camenisch and L. Chen, Direct anonymous attestation, in: Proceedings of ACM Conference on Computer and Communication Security, Washington, DC, USA, 2004, pp. 132-145.
-
(2004)
Proceedings of ACM Conference on Computer and Communication Security
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
17
-
-
70349659108
-
Semantic remote attestation - A virtual machine directed approach to trusted computing
-
San Jose, CA, USA, USENIX
-
V. Haldar, D. Chandra and M. Franz, Semantic remote attestation - a virtual machine directed approach to trusted computing, in: Proceedings of the Third virtual Machine Research and Technology Symposium, San Jose, CA, USA, 2004, USENIX, pp. 29-41.
-
(2004)
Proceedings of the Third Virtual Machine Research and Technology Symposium
, pp. 29-41
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
18
-
-
17544394392
-
Computer security in the real world
-
B. Lampson, Computer security in the real world, IEEE Computer (6) (2004), 37-46.
-
(2004)
IEEE Computer
, Issue.6
, pp. 37-46
-
-
Lampson, B.1
-
19
-
-
84984064460
-
Policy/mechanism separation in Hydra
-
R. Levin, E. Cohen, W. Corwin, F. Pollack and W. Wulf, Policy/mechanism separation in Hydra, in: 5th ACM Symposium on Operating Systems Principles, 1975, pp. 132-140.
-
(1975)
5th ACM Symposium on Operating Systems Principles
, pp. 132-140
-
-
Levin, R.1
Cohen, E.2
Corwin, W.3
Pollack, F.4
Wulf, W.5
-
20
-
-
0003505824
-
-
Digital Press
-
H. Levy, Capability-based computer systems, Digital Press, 1984, Available at http://www.cs.washington.edu/homes/levy/capabook/index.html.
-
(1984)
Capability-based Computer Systems
-
-
Levy, H.1
-
21
-
-
2442425355
-
Integrating flexible support for security policies into the Linux operating system
-
P. Loscocco and S. Smalley, Integrating flexible support for security policies into the Linux operating system, in: Proceedings of USENIX Annual Technical Conference, 2001, pp. 29-42.
-
(2001)
Proceedings of USENIX Annual Technical Conference
, pp. 29-42
-
-
Loscocco, P.1
Smalley, S.2
-
23
-
-
84949486483
-
Binding identities and attributes using digitally signed certificates
-
New Orleans, LA, USA
-
J.S. Park and R. Sandhu, Binding identities and attributes using digitally signed certificates, in: Proceedings Annual Computer Security Applications Conference, New Orleans, LA, USA, 2000, pp. 120-127.
-
(2000)
Proceedings Annual Computer Security Applications Conference
, pp. 120-127
-
-
Park, J.S.1
Sandhu, R.2
-
24
-
-
35048881059
-
Taming trusted platforms by operating system design
-
Berlin, Germany
-
A. Sadeghi and C. Stuble, Taming trusted platforms by operating system design, in: Proceedings of the 4th International Workshop for Information Security Applications, LNCS 2908, Berlin, Germany, 2003, pp. 286-302.
-
(2003)
Proceedings of the 4th International Workshop for Information Security Applications, LNCS
, vol.2908
, pp. 286-302
-
-
Sadeghi, A.1
Stuble, C.2
-
25
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
NS, Canada
-
A. Sadeghi and C. Stuble, Property-based attestation for computing platforms: Caring about properties, not mechanisms, in: Proceedings of New Security Paradigms Workshop, NS, Canada, 2004, pp. 67-77.
-
(2004)
Proceedings of New Security Paradigms Workshop
, pp. 67-77
-
-
Sadeghi, A.1
Stuble, C.2
-
26
-
-
14844291531
-
Attestation-based policy enforcement for remote access
-
Washington, DC, USA
-
R. Sailer, T. Jaeger, X. Zhang and L. van Doom, Attestation-based policy enforcement for remote access, in: Proceedings of ACM Conference on Computer and Communication Security, Washington, DC, USA, 2004, pp. 308-317.
-
(2004)
Proceedings of ACM Conference on Computer and Communication Security
, pp. 308-317
-
-
Sailer, R.1
Jaeger, T.2
Zhang, X.3
Van Doom, L.4
-
27
-
-
30644461987
-
Information protection and the control of sharing in the Multics system
-
J.H. Saltzer, Information protection and the control of sharing in the Multics system, Communications of the ACM 17(7) (1974).
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
-
-
Saltzer, J.H.1
-
28
-
-
0030086382
-
Role based access control models
-
R. Sandhu, E. Coyne, H. Feinstein and C. Youman, Role based access control models, IEEE Computer 29(2) (1996).
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
29
-
-
34247346997
-
Secure information sharing enabled by trusted computing and PEI models
-
Taipei, Taiwan
-
R. Sandhu, K. Ranganathan and X. Zhang, Secure information sharing enabled by trusted computing and PEI models, in: Proceedings of ACM Symposium on Information, Computer, and Communication Security, Taipei, Taiwan, 2006.
-
(2006)
Proceedings of ACM Symposium on Information, Computer, and Communication Security
-
-
Sandhu, R.1
Ranganathan, K.2
Zhang, X.3
-
30
-
-
33745450500
-
Formal model and policy specification of usage control
-
X. Zhang, F. Parisi-Presicce, R. Sandhu and J. Park, Formal model and policy specification of usage control, ACM Transactions on Information and Systems Security 8(4) (2005), 351-387.
-
(2005)
ACM Transactions on Information and Systems Security
, vol.8
, Issue.4
, pp. 351-387
-
-
Zhang, X.1
Parisi-Presicce, F.2
Sandhu, R.3
Park, J.4
|