-
1
-
-
33751118430
-
-
Department of Defense Trusted Computer System Evaluation Criteria, Dec. 1985
-
Department of Defense Trusted Computer System Evaluation Criteria, Dec. 1985.
-
-
-
-
2
-
-
84860035570
-
-
Nov.
-
Globus toolkit advisories. http://www-unix. globus.org/toolkit/ advisories.html, Nov. 2005.
-
(2005)
-
-
-
3
-
-
1142270162
-
-
Prentice Hall, New Jersey
-
B. Balacheff, L. Chen, S. Pearson, D. Plaquin, and G. Proudler. Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall, New Jersey, 2003.
-
(2003)
Trusted Computing Platforms: TCPA Technology in Context
-
-
Balacheff, B.1
Chen, L.2
Pearson, S.3
Plaquin, D.4
Proudler, G.5
-
4
-
-
0027684663
-
Operating system protection through program evoloution
-
Oct.
-
F. Cohen. Operating system protection through program evoloution. Computers and Security, 12(6):565-584, Oct. 1993.
-
(1993)
Computers and Security
, vol.12
, Issue.6
, pp. 565-584
-
-
Cohen, F.1
-
6
-
-
0032218229
-
A security architecture for computational grids
-
ACM Press
-
I. T. Foster, C. Kesselman, G. Tsudik, and S. Tuecke. A security architecture for computational grids. In ACM Conference on Computer and Communications Security, pages 83-92. ACM Press, 1998.
-
(1998)
ACM Conference on Computer and Communications Security
, pp. 83-92
-
-
Foster, I.T.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
7
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
Oct.
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In Proc. 19th Symposium on Operating System Principles(SOSP 2003), Oct. 2003.
-
(2003)
Proc. 19th Symposium on Operating System Principles(SOSP 2003)
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
8
-
-
33751103092
-
From sandbox to playground: Dynamic virtual environments in the grid
-
Pittsburgh, PA, Nov.
-
K. Keahey, K. Doering, and I. Foster. From sandbox to playground: Dynamic virtual environments in the grid. In 5th International Conference on Grid Computing (Grid 2004), Pittsburgh, PA, Nov. 2004.
-
(2004)
5th International Conference on Grid Computing (Grid 2004)
-
-
Keahey, K.1
Doering, K.2
Foster, I.3
-
9
-
-
0003262137
-
The inevitability of failure: The flawed assumption of security in modern computing environments
-
Oct.
-
P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The inevitability of failure: The flawed assumption of security in modern computing environments. In Proc. 21st National Information Systems Security Conference, pages 303-314, Oct. 1998.
-
(1998)
Proc. 21st National Information Systems Security Conference
, pp. 303-314
-
-
Loscocco, P.A.1
Smalley, S.D.2
Muckelbauer, P.A.3
Taylor, R.C.4
Turner, S.J.5
Farrell, J.F.6
-
12
-
-
84957893114
-
On software protection via function hiding
-
D. Aucsmith, editor, number vol. 1525 in Lecture Notes in Computer Science. Springer-Verlag, New York
-
T. Sander and C. Tschudin. On software protection via function hiding. In D. Aucsmith, editor, Proceedings of the 2nd International Conferance on Information Hiding, number vol. 1525 in Lecture Notes in Computer Science, pages 111-123. Springer-Verlag, New York, 1998.
-
(1998)
Proceedings of the 2nd International Conferance on Information Hiding
, pp. 111-123
-
-
Sander, T.1
Tschudin, C.2
-
14
-
-
84881417498
-
Deploying virtual machines as sandboxes for the grid
-
To appear, San Francisco, Dec. University of Wisconsin-Madison, unpublished
-
S. Santhanam, P. Elango, A. A. Dusseau, and M. Livny. Deploying virtual machines as sandboxes for the grid. In To appear, 2nd Workshop on Real, Large Distributed Systems (WORLDS '05), San Francisco, Dec. 2005. University of Wisconsin-Madison, unpublished.
-
(2005)
2nd Workshop on Real, Large Distributed Systems (WORLDS '05)
-
-
Santhanam, S.1
Elango, P.2
Dusseau, A.A.3
Livny, M.4
-
16
-
-
27544477855
-
BIND: A fine-grained attestation service for secure distributed systems
-
Oakland, CA, May. IEEE Press
-
E. Shi, A. Perrig, and L. van Doom. BIND: A fine-grained attestation service for secure distributed systems. In Proc. IEEE Security & Privacy Conf., Oakland, CA, May 2005. IEEE Press.
-
(2005)
Proc. IEEE Security & Privacy Conf.
-
-
Shi, E.1
Perrig, A.2
Van Doom, L.3
-
18
-
-
67049103407
-
Toward realizable restricted delegation in computational grids
-
Amsterdam, Netherlands, June
-
G. Stoker, B. S. White, E. Stackpole, T. Highley, and M. Humphrey. Toward realizable restricted delegation in computational grids. In European High Performance Computing and Networking (HPCN 2001), pages 32-41, Amsterdam, Netherlands, June 2001.
-
(2001)
European High Performance Computing and Networking (HPCN 2001)
, pp. 32-41
-
-
Stoker, G.1
White, B.S.2
Stackpole, E.3
Highley, T.4
Humphrey, M.5
-
20
-
-
0002717089
-
Protecting mobile agents through tracing
-
Springer-Verlag, New York
-
G. Vigna. Protecting mobile agents through tracing. In Lecture Notes in Computer Science, number vol. 1419, pages 137-153. Springer-Verlag, New York, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1419
, pp. 137-153
-
-
Vigna, G.1
-
21
-
-
84982946701
-
A sanctuary for mobile agents
-
J. Vitek and C. Jensen, editors, number vol. 1603 in Lecture Notes in Computer Science, Springer-Verlag, New York
-
B. Yee. A sanctuary for mobile agents. In J. Vitek and C. Jensen, editors, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, number vol. 1603 in Lecture Notes in Computer Science, pages 261-274. Springer-Verlag, New York, 1999.
-
(1999)
Secure Internet Programming: Security Issues for Mobile and Distributed Objects
, pp. 261-274
-
-
Yee, B.1
|