-
2
-
-
84941165741
-
-
Department of Defense, Department of Defense Trusted Computer System Evaluation Criteria. DoD 5200.28-STD, December 1985
-
Department of Defense, Department of Defense Trusted Computer System Evaluation Criteria. DoD 5200.28-STD, December 1985.
-
-
-
-
3
-
-
0035474388
-
Building the IBM 4758 secure coprocessor
-
October
-
J. Dyer, M. Lindemann, R. Perez, R. Sailer, S.W. Smith, L.van Doom, and S. Weingart. Building the IBM 4758 Secure Coprocessor. IEEE Computer, 34:57-66, October 2001.
-
(2001)
IEEE Computer
, vol.34
, pp. 57-66
-
-
Dyer, J.1
Lindemann, M.2
Perez, R.3
Sailer, R.4
Smith, S.W.5
Van Doom, L.6
Weingart, S.7
-
4
-
-
1142280988
-
AEGIS: Architecture for tamper-evident and tamper-resistant processing
-
G. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas. AEGIS: Architecture for Tamper-Evident and Tamper-Resistant processing. In Proceedings of the 17Int'l Conference on Supercomputing, pages 160-171, 2003.
-
(2003)
Proceedings of the 17Int'l Conference on Supercomputing
, pp. 160-171
-
-
Suh, G.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
6
-
-
0033293553
-
Building a high-performance, programmable secure coprocessor
-
April
-
S.W. Smith and S. Weingart. Building a High-Performance, Programmable Secure Coprocessor. Computer Networks, 31:831-860, April 1999.
-
(1999)
Computer Networks
, vol.31
, pp. 831-860
-
-
Smith, S.W.1
Weingart, S.2
-
9
-
-
33745777691
-
-
Trusted Computing Group, 13 February
-
TPM Main, Part 1, Design Principles, Specification Version 1.2, Revision 85, Trusted Computing Group, 13 February 2005.
-
(2005)
TPM Main, Part 1, Design Principles, Specification Version 1.2, Revision 85
-
-
-
10
-
-
33750053648
-
-
Trusted Computing Group, 13 February
-
TPM Main, Part 2, TPM Structures, Specification Version 1.2, Level 2 Revision 85, Trusted Computing Group, 13 February 2005.
-
(2005)
TPM Main, Part 2, TPM Structures, Specification Version 1.2, Level 2 Revision 85
-
-
-
11
-
-
33750063571
-
-
Trusted Computing Group, 13 February
-
TPM Main, Part 3, Commands, Specification Version 1.2, Level 2 Revision 85, Trusted Computing Group, 13 February 2005.
-
(2005)
TPM Main, Part 3, Commands, Specification Version 1.2, Level 2 Revision 85
-
-
-
16
-
-
33846301080
-
PorKI: Making user PKI safe on machines of heterogeneous trustworthiness
-
IEEE Computer Society. December
-
S. Sinclair, S. W. Smith. PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness. 21st Annual Computer Security Applications Conference. IEEE Computer Society. December 2005.
-
(2005)
21st Annual Computer Security Applications Conference
-
-
Sinclair, S.1
Smith, S.W.2
-
18
-
-
20744446447
-
Security for grids
-
March
-
M. Humphrey, M. Thompson, K. R. Jackson. Security for Grids In Proceedings of the IEEE (Special Issue on Grid Computing), Vol.93, No.3, March 2005.
-
(2005)
Proceedings of the IEEE (Special Issue on Grid Computing)
, vol.93
, Issue.3
-
-
Humphrey, M.1
Thompson, M.2
Jackson, K.R.3
-
19
-
-
21644470487
-
Experimenting with TCPA/TCG hardware, Or: How I learned to stop worrying and love the bear
-
Department of Computer Science, Dartmouth College
-
J. Marchesini, S.W. Smith, O. Wild, and R. MacDonald. Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear. Technical Report TR2003-476, Department of Computer Science, Dartmouth College, 2003.
-
(2003)
Technical Report
, vol.TR2003-476
-
-
Marchesini, J.1
Smith, S.W.2
Wild, O.3
MacDonald, R.4
-
20
-
-
84887853842
-
A community authorization service for group collaboration
-
L. Pearlman, V. Welch, I. Foster, C. Kesselman, and S. Tuecke, A Community Authorization Service for Group Collaboration, In Proceedings of IEEE 3rd Int. Workshop on Policies for Distributed Systems and Networks, 2002.
-
(2002)
Proceedings of IEEE 3rd Int. Workshop on Policies for Distributed Systems and Networks
-
-
Pearlman, L.1
Welch, V.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
|