-
1
-
-
33846297184
-
-
TCG TPM Specification Version 1.2. http://www.trustedcomputinggroup.org.
-
TCG TPM Specification Version 1.2. http://www.trustedcomputinggroup.org.
-
-
-
-
2
-
-
33846267157
-
-
Advanced Micro Devices. AMD64 Virtualization Codenamed Pacifica Technology, Secure Virtual Machine Architecture Reference Manual, Rev 3.01, May 2005. http://www.amd.com/us-en/assets/content_type/ white_papers_and_tech_docs/33047.pdf.
-
Advanced Micro Devices. AMD64 Virtualization Codenamed "Pacifica" Technology, Secure Virtual Machine Architecture Reference Manual, Rev 3.01, May 2005. http://www.amd.com/us-en/assets/content_type/ white_papers_and_tech_docs/33047.pdf.
-
-
-
-
3
-
-
21644433634
-
Xen and the art of Virtualization
-
October
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of Virtualization. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, October 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
4
-
-
0003400251
-
Secure computer systems: Unified exposition and multics interpretation
-
Technical report, MITRE MTR-2997, March
-
D. E. Bell and L. J. LaPadula. Secure computer systems: Unified exposition and multics interpretation. Technical report, MITRE MTR-2997, March 1976.
-
(1976)
-
-
Bell, D.E.1
LaPadula, L.J.2
-
5
-
-
0003400255
-
Integrity Considerations for Secure Computer Systems
-
Technical Report MTR-3153, Mitre Corporation, Mitre Corp, Bedford MA, June
-
K. J. Biba. Integrity Considerations for Secure Computer Systems. Technical Report MTR-3153, Mitre Corporation, Mitre Corp, Bedford MA, June 1975.
-
(1975)
-
-
Biba, K.J.1
-
10
-
-
21644455412
-
Terra: A Virtual Machine-Based Platform for Trusted Computing
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, Terra: A Virtual Machine-Based Platform for Trusted Computing. In Proc. 9th ACM Symposium on Operating Systems Principles, pages 193-206, 2003.
-
(2003)
Proc. 9th ACM Symposium on Operating Systems Principles
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
12
-
-
84926427148
-
Survey of Virtual Machine Research
-
R. P. Goldberg. Survey of Virtual Machine Research. IEEE Computer Magazine, 7(6):34-45, 1974.
-
(1974)
IEEE Computer Magazine
, vol.7
, Issue.6
, pp. 34-45
-
-
Goldberg, R.P.1
-
14
-
-
33846290874
-
-
IBM Research, Multi-Purpose Research Hypervisor
-
IBM Research. The Research Hypervisor - A Multi-Platform, Multi-Purpose Research Hypervisor. http://www.research.ibm.com/ hypervisor.
-
The Research Hypervisor - A Multi-Platform
-
-
-
15
-
-
33846274417
-
-
Intel. Intel Virtualization Technology Specification for the IA-32 Intel Architecture, April 2005. ftp://download.intel.com/technology/computing/vptech/ C97063-002.pdf.
-
Intel. Intel Virtualization Technology Specification for the IA-32 Intel Architecture, April 2005. ftp://download.intel.com/technology/computing/vptech/ C97063-002.pdf.
-
-
-
-
16
-
-
33846274797
-
-
J. P. Anderson et. al. Computer security technology planning study. Technical Report ESD-TR-73-51, I+II, Air Force Systems Command, USAF, 1972.
-
J. P. Anderson et. al. Computer security technology planning study. Technical Report ESD-TR-73-51, Vol. I+II, Air Force Systems Command, USAF, 1972.
-
-
-
-
19
-
-
0025137215
-
-
P. A. Karger, M. E. Zurko, D. W. Bonin, A. H. Mason, and C.E. Kahn. A VMM Security Kernel for the VAX Architecture. In Proc. IEEE Symposium on Security and Privacy, May 1990.
-
P. A. Karger, M. E. Zurko, D. W. Bonin, A. H. Mason, and C.E. Kahn. A VMM Security Kernel for the VAX Architecture. In Proc. IEEE Symposium on Security and Privacy, May 1990.
-
-
-
-
20
-
-
0026254933
-
A Retrospective on the VAX VMM Security Kernel
-
November
-
P. A. Karger, M. E. Zurko, D. W. Bonin, A. H. Mason, and C. E. Kahn. A Retrospective on the VAX VMM Security Kernel. In IEEE Transaction on Software Engineering, November 1991.
-
(1991)
IEEE Transaction on Software Engineering
-
-
Karger, P.A.1
Zurko, M.E.2
Bonin, D.W.3
Mason, A.H.4
Kahn, C.E.5
-
22
-
-
84883516955
-
th Symposium on Operating System Principles
-
th Symposium on Operating System Principles, 1995.
-
(1995)
-
-
Liedtke, J.1
-
25
-
-
33751069196
-
NetTop - Commercial Technology in High Assurance Applications
-
Fall
-
R. Meushaw and D. Simard. NetTop - Commercial Technology in High Assurance Applications. Tech Trend Notes, Fall 2000.
-
(2000)
Tech Trend Notes
-
-
Meushaw, R.1
Simard, D.2
-
26
-
-
33845953872
-
-
National Security Agency, SELinux
-
National Security Agency. Security-Enhanced Linux (SELinux). http://www.nsa.gov/selinux.
-
Security-Enhanced Linux
-
-
-
27
-
-
0020273088
-
Proof of Separability - A verification technique for a class of security kernels
-
Proc. 5th International Symposium on Programming, of, Turin, Italy, Springer-Verlag
-
J. Rushby. Proof of Separability - A verification technique for a class of security kernels. In Proc. 5th International Symposium on Programming, volume 137 of Lecture Notes in Computer Science, pages 352-367, Turin, Italy, 1982. Springer-Verlag.
-
(1982)
Lecture Notes in Computer Science
, vol.137
, pp. 352-367
-
-
Rushby, J.1
-
28
-
-
85084162270
-
Design and Implementation of a TCG-based Integrity Measurement Architecture
-
August
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doom. Design and Implementation of a TCG-based Integrity Measurement Architecture. In Thirteenth USENIX Security Symposium, pages 223-238, August 2004.
-
(2004)
Thirteenth USENIX Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
van Doom, L.4
-
30
-
-
33846278186
-
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card
-
H. Scherzer, R. Canetti, P. A. Karger, H. Krawczyk, T. Rabin, and D. C. Toll. Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. In (ESORICS), 2003.
-
(2003)
(ESORICS)
-
-
Scherzer, H.1
Canetti, R.2
Karger, P.A.3
Krawczyk, H.4
Rabin, T.5
Toll, D.C.6
-
33
-
-
85084160641
-
The Flask Security Architecture: System support for diverse security policies
-
August
-
R. Spencer, P. Loscocco, S. Smalley, M. Hibler, D. Anderson, and J. Lepreau. The Flask Security Architecture: System support for diverse security policies. In Proceedings of The Eighth USENIX Security Symposium, August 1999.
-
(1999)
Proceedings of The Eighth USENIX Security Symposium
-
-
Spencer, R.1
Loscocco, P.2
Smalley, S.3
Hibler, M.4
Anderson, D.5
Lepreau, J.6
-
34
-
-
33846328576
-
-
VMware. http://www.vmware.com/.
-
VMware
-
-
-
35
-
-
33846311964
-
-
XenSource. http://xenbits.xensource.com/xen-unstable.hg.
-
XenSource
-
-
|