-
1
-
-
33846289434
-
-
AMD64 Virtualization Codenamed Pacifica Technology: Secure Virtual Machine Architecture Reference Manual, Publication No. 33047, Revision 3.01, May 2005, Advanced Micro Devices: Sunnyvale, CA. URL: http://www.amd.com/us-en/assets/content_type/white_papers_and_tech_docs/ 33047.pdf
-
AMD64 Virtualization Codenamed "Pacifica" Technology: Secure Virtual Machine Architecture Reference Manual, Publication No. 33047, Revision 3.01, May 2005, Advanced Micro Devices: Sunnyvale, CA. URL: http://www.amd.com/us-en/assets/content_type/white_papers_and_tech_docs/ 33047.pdf
-
-
-
-
2
-
-
33846284016
-
-
Certification Report for Processor Resource/ System Manager (PR/SM) for the IBM eServer zSeries 900, BSI-DSZ-CC-0179-2003,27 February 2003, Bundesamt für Sicherheit in der Informationstechnik: Bonn, Germany. URL: http://www.commoncriteriaportal.org/public/files/epfiles/0179a.pdf
-
Certification Report for Processor Resource/ System Manager (PR/SM) for the IBM eServer zSeries 900, BSI-DSZ-CC-0179-2003,27 February 2003, Bundesamt für Sicherheit in der Informationstechnik: Bonn, Germany. URL: http://www.commoncriteriaportal.org/public/files/epfiles/0179a.pdf
-
-
-
-
3
-
-
33846292061
-
-
Certification Report: BAE SYSTEMS, Trusted Filter Version 1.0, Certificate Number: 2001/19, July 2001, Defense Signals Directorate, Australasian Certification Authority: Kingston, ACT, Australia. URL
-
Certification Report: BAE SYSTEMS - Trusted Filter Version 1.0, Certificate Number: 2001/19, July 2001, Defense Signals Directorate - Australasian Certification Authority: Kingston, ACT, Australia. URL: http://www.dsd.gov.au/infosec/evaluation_services/epl/network_security/ BAESystems_TrustedFilter.html
-
-
-
-
4
-
-
33846320675
-
-
Computer Security Requirements - Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments, CSC-STD-003-85, 25 June 1985, DoD Computer Security Center: Ft. George G. Meade, MD. URL: http://www.radium.ncsc.mil/tpep/library/ rainbow/index.html
-
Computer Security Requirements - Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments, CSC-STD-003-85, 25 June 1985, DoD Computer Security Center: Ft. George G. Meade, MD. URL: http://www.radium.ncsc.mil/tpep/library/ rainbow/index.html
-
-
-
-
5
-
-
33846304090
-
-
Department of Defense Trusted Computer System Evaluation Criteria, DOD 5200.28-STD, December 1985: Washington, DC. URL: http://csrc.nist.gov/ publications/history/dod85.pdf
-
Department of Defense Trusted Computer System Evaluation Criteria, DOD 5200.28-STD, December 1985: Washington, DC. URL: http://csrc.nist.gov/ publications/history/dod85.pdf
-
-
-
-
6
-
-
33846307634
-
-
DoD Information Technology Security Certification and Accreditation Process (DITSCAP), DoD Instruction 5200.40, 30 December 1997, Department of Defense: Washington, DC. URL: http://www.dtic.mil/whs/directives/corres/pdf/ i520040_123097/i520040p.pdf
-
DoD Information Technology Security Certification and Accreditation Process (DITSCAP), DoD Instruction 5200.40, 30 December 1997, Department of Defense: Washington, DC. URL: http://www.dtic.mil/whs/directives/corres/pdf/ i520040_123097/i520040p.pdf
-
-
-
-
11
-
-
33846270196
-
-
Security Requirements for Automatic Data Processing (ADP) Systems, DoD Directive 5200.28, 18 December 1972, Department of Defense: Washington, DC.
-
Security Requirements for Automatic Data Processing (ADP) Systems, DoD Directive 5200.28, 18 December 1972, Department of Defense: Washington, DC.
-
-
-
-
12
-
-
33846321059
-
-
Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements - Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments, CSC-STD-004-85, 25 June 1985, DoD Computer Security Center: Ft. George G. Meade, MD. URL: http://www.radium.nc sc.mil/tpep/library/rainbow/index.html
-
Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements - Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments, CSC-STD-004-85, 25 June 1985, DoD Computer Security Center: Ft. George G. Meade, MD. URL: http://www.radium.nc sc.mil/tpep/library/rainbow/index.html
-
-
-
-
13
-
-
33846327792
-
Techniques and Procedures for Implementing, Deactivating, Testing, and Evaluating Secure Resource-Sharing ADP Systems
-
January, Department of Defense: Washington, DC
-
Techniques and Procedures for Implementing, Deactivating, Testing, and Evaluating Secure Resource-Sharing ADP Systems, DoD 5200.28-M, January 1973, Department of Defense: Washington, DC.
-
(1973)
DoD 5200.28-M
-
-
-
14
-
-
33846266067
-
-
Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria, NCSC-TG-005, Version-1, 31 July 1987, National Computer Security Center: Ft. George G. Meade, MD. URL: http://www.radiimi.ncsc.mil/ tpep/library/tcsec/index.html
-
Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria, NCSC-TG-005, Version-1, 31 July 1987, National Computer Security Center: Ft. George G. Meade, MD. URL: http://www.radiimi.ncsc.mil/ tpep/library/tcsec/index.html
-
-
-
-
15
-
-
33645356018
-
A Virtual Machine System for the 360/40
-
Report 320-2007, May, IBM Cambridge Scientific Center: Cambridge, MA
-
Adair, R.J., R.U. Bayles, L.W. Comeau, and R.J. Creasy, A Virtual Machine System for the 360/40, Report 320-2007, May 1966, IBM Cambridge Scientific Center: Cambridge, MA.
-
(1966)
-
-
Adair, R.J.1
Bayles, R.U.2
Comeau, L.W.3
Creasy, R.J.4
-
16
-
-
25844477999
-
Advanced Virtualization Capabilities of POWERS Systems
-
July/September, URL
-
Armstrong, W.J., R.L. Amdt, D.C. Boutcher, R.G. Kovacs, D. Larson, K.A. Lucke, N. Nayar, and R.C. Swanberg, Advanced Virtualization Capabilities of POWERS Systems. IBM Journal of Research and Development, July/September 2005. 49(4/5): p. 523-532. URL: http://www.research. ibm.com/journal/rd/494/armstrong.html
-
(2005)
IBM Journal of Research and Development
, vol.49
, Issue.4-5
, pp. 523-532
-
-
Armstrong, W.J.1
Amdt, R.L.2
Boutcher, D.C.3
Kovacs, R.G.4
Larson, D.5
Lucke, K.A.6
Nayar, N.7
Swanberg, R.C.8
-
17
-
-
33846334300
-
-
Barham, P., B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the Art of Virtualizatian. in Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles (SOSP). 19-22 October 2003, Bolton Landing, NY: ACM Press. URL: http://www.cl.catn.ac.uk/Research/SRG/netos/papers/2003-xensosp.pdf
-
Barham, P., B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the Art of Virtualizatian. in Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles (SOSP). 19-22 October 2003, Bolton Landing, NY: ACM Press. URL: http://www.cl.catn.ac.uk/Research/SRG/netos/papers/2003-xensosp.pdf
-
-
-
-
18
-
-
33846276748
-
-
Bell, D.E. and L.J. LaPadula, Computer Security Model: Unified Exposition and Multics Interpretation, ESD-TR-75-306, March 1976, The MITRE Corporation, Bedford, MA: HQ Electronic Systems Division, Hanscom AFB, MA. URL: http://csrc.nist.gov/publications/history/bell76.pdf
-
Bell, D.E. and L.J. LaPadula, Computer Security Model: Unified Exposition and Multics Interpretation, ESD-TR-75-306, March 1976, The MITRE Corporation, Bedford, MA: HQ Electronic Systems Division, Hanscom AFB, MA. URL: http://csrc.nist.gov/publications/history/bell76.pdf
-
-
-
-
19
-
-
33846272955
-
-
WP-20119, April, The MITRE Corporation: Bedford, MA
-
Biba, K.J., S.R. Ames, E.L. Burke, P.A. Karger, W.R. Price, R.R. Schell, and W.L. Schiller, A Preliminary Specification of a Multics Security Kernel, WP-20119, April 1975, The MITRE Corporation: Bedford, MA.
-
(1975)
A Preliminary Specification of a Multics Security Kernel
-
-
Biba, K.J.1
Ames, S.R.2
Burke, E.L.3
Karger, P.A.4
Price, W.R.5
Schell, R.R.6
Schiller, W.L.7
-
20
-
-
33846288738
-
-
Broadbridge, R. and J. Mekota, Secure Communications Processor Specification, ESD-TR-76-351, II, June 1976, Honeywell Information Systems, Inc., McLean, VA: HQ Electronic Systems Division, Hanscom AFB, MA.
-
Broadbridge, R. and J. Mekota, Secure Communications Processor Specification, ESD-TR-76-351, Vol. II, June 1976, Honeywell Information Systems, Inc., McLean, VA: HQ Electronic Systems Division, Hanscom AFB, MA.
-
-
-
-
21
-
-
0026157231
-
-
Hall, J.S. and P.T. Robinson. Virtualizing the VAX Architecture, in 18th International Symposium on Computer Architecture. May 1991, Toronto, ON, Canada: published in Computer Architecture News, 19. p. 380-389.
-
Hall, J.S. and P.T. Robinson. Virtualizing the VAX Architecture, in 18th International Symposium on Computer Architecture. May 1991, Toronto, ON, Canada: published in Computer Architecture News, vol. 19. p. 380-389.
-
-
-
-
22
-
-
0018289092
-
Evolution of a Virtual Machine Subsystem
-
URL
-
Hendricks, E.C. and T.C. Hartmann, Evolution of a Virtual Machine Subsystem. IBM Systems Journal, 1979. 18(1): p. 111-142. URL: http://domino.research.ibm.com/tchjr/journalindex.nsf/SysVolumes?OpenView
-
(1979)
IBM Systems Journal
, vol.18
, Issue.1
, pp. 111-142
-
-
Hendricks, E.C.1
Hartmann, T.C.2
-
23
-
-
33846268995
-
-
Hinke, T.H. and M. Schaefer, Secure Data Management System, RADC-TR-75-266 [NTIS AD A019201], November 1975, Rome Air Development Center: Griffiss AFB, NY.
-
Hinke, T.H. and M. Schaefer, Secure Data Management System, RADC-TR-75-266 [NTIS AD A019201], November 1975, Rome Air Development Center: Griffiss AFB, NY.
-
-
-
-
24
-
-
0038253143
-
Improving Security and Performance for Capability Systems
-
No. 149, October 1988, University of Cambridge: Cambridge, England
-
Karger, P.A., Improving Security and Performance for Capability Systems, Computer Laboratory Technical Report No. 149, October 1988, University of Cambridge: Cambridge, England.
-
Computer Laboratory Technical Report
-
-
Karger, P.A.1
-
25
-
-
33846283267
-
-
Karger, P.A., Multi-Organizational Mandatory Access Controls for Commercial Applications, RC 21673 (97655), 22 February 2000, IBM Research Division, Thomas J. Watson Research Center: Yorktown Heights, NY. URL: http://domino.watson.ibm.com/library/CyberDig.nsf/home
-
Karger, P.A., Multi-Organizational Mandatory Access Controls for Commercial Applications, RC 21673 (97655), 22 February 2000, IBM Research Division, Thomas J. Watson Research Center: Yorktown Heights, NY. URL: http://domino.watson.ibm.com/library/CyberDig.nsf/home
-
-
-
-
26
-
-
33846282209
-
-
Karger, P.A., Non-Discretionary Access Control for Decentralized Computing Systems, S. M. & E. E. thesis 1977, Laboratory for Computer Science, Massachusetts Institute of Technology: Cambridge, MA. URL: http://ncstrl.mit.edu:80/Dienst/UI/2.0/Describe/ncstrl. mit_1cs%2fMIT%2ILCS%2fTR-L179
-
Karger, P.A., Non-Discretionary Access Control for Decentralized Computing Systems, S. M. & E. E. thesis 1977, Laboratory for Computer Science, Massachusetts Institute of Technology: Cambridge, MA. URL: http://ncstrl.mit.edu:80/Dienst/UI/2.0/Describe/ncstrl. mit_1cs%2fMIT%2ILCS%2fTR-L179
-
-
-
-
27
-
-
33846328213
-
-
Karger, P.A. Non-Discretionary Security for Decentralized Computing Systems: Host to Host Protocols. in Trends and Applications: 1978 Distributed Processing. 18 May 1978, National Bureau of Standards, Gaithersburg, MD: IEEE. p. 32-39.
-
Karger, P.A. Non-Discretionary Security for Decentralized Computing Systems: Host to Host Protocols. in Trends and Applications: 1978 Distributed Processing. 18 May 1978, National Bureau of Standards, Gaithersburg, MD: IEEE. p. 32-39.
-
-
-
-
29
-
-
33644484966
-
Using a Mandatory Secrecy and Integrity Policy on Smart Cards and Mobile Devices
-
13-15 June, Marseilles, France: p
-
Karger, P.A., V.R. Austel, and B.C. Toll. Using a Mandatory Secrecy and Integrity Policy on Smart Cards and Mobile Devices, in EUROSMART Security Conference. 13-15 June 2000, Marseilles, France: p. 134-148.
-
(2000)
EUROSMART Security Conference
, pp. 134-148
-
-
Karger, P.A.1
Austel, V.R.2
Toll, B.C.3
-
30
-
-
84956989246
-
Using Mandatory Secrecy and Integrity for Business to Business Applications on Mobile Devices
-
25-27 September, Naval Postgraduate School, Monterey, CA: published on CB-ROM. URL
-
Karger, P.A., V.R. Austel, and B.C. Toll. Using Mandatory Secrecy and Integrity for Business to Business Applications on Mobile Devices, in Workshop on Innovations in Strong Access Control. 25-27 September 2000, Naval Postgraduate School, Monterey, CA: published on CB-ROM. URL: http://www.acsac.org/sac-tac/wisac00/wed0830.karger.pdf
-
(2000)
Workshop on Innovations in Strong Access Control
-
-
Karger, P.A.1
Austel, V.R.2
Toll, B.C.3
-
31
-
-
84948969398
-
Thirty Years Later: Lessons from the Multics Security Evaluation
-
9-13 December, Las Vegas, NV: IEEE Computer Society, p, URL
-
Karger, P.A. and R.R. Schell. Thirty Years Later: Lessons from the Multics Security Evaluation, in Proceedings of the 18th Annual Computer Security Applications Conference. 9-13 December 2002, Las Vegas, NV: IEEE Computer Society, p. 119-126. URL: http://www.acsac.org/2002/papers/classic- multics.pdf
-
(2002)
Proceedings of the 18th Annual Computer Security Applications Conference
, pp. 119-126
-
-
Karger, P.A.1
Schell, R.R.2
-
32
-
-
0026254933
-
A Retrospective on the VAX VMM Security Kernel
-
November
-
Karger, P.A., M.E. Zurko, B.W. Bonin, A.H. Mason, and C.E. Kahn, A Retrospective on the VAX VMM Security Kernel. IEEE Transactions on Software Engineering, November 1991. 17(11): p. 1147-1165.
-
(1991)
IEEE Transactions on Software Engineering
, vol.17
, Issue.11
, pp. 1147-1165
-
-
Karger, P.A.1
Zurko, M.E.2
Bonin, B.W.3
Mason, A.H.4
Kahn, C.E.5
-
33
-
-
33846302646
-
-
Kerner, S.M., IBM Offers Support for Xen. internetnews.com, 19 January 2005. URL: http://www.internetnews.com/dev-news/article.php/ 3461481
-
Kerner, S.M., IBM Offers Support for Xen. internetnews.com, 19 January 2005. URL: http://www.internetnews.com/dev-news/article.php/ 3461481
-
-
-
-
34
-
-
0015672289
-
A note on the confinement problem
-
October
-
Lampson, B.W., A note on the confinement problem. Communications of the ACM, October 1973.16(10): p. 613-615.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
35
-
-
0018734180
-
On the duality of operating system structures
-
B. Lanciaux, Editor, North-Holland: Amsterdam, p
-
Lauer, H.C. and R.M. Needham, On the duality of operating system structures, in Operating Systems: Theory and Practice, B. Lanciaux, Editor. 1979, North-Holland: Amsterdam, p. 371-384.
-
(1979)
Operating Systems: Theory and Practice
, pp. 371-384
-
-
Lauer, H.C.1
Needham, R.M.2
-
36
-
-
33846283266
-
A Time-Sharing System Using an Associative Memory
-
December
-
Lindquist, A.B., R.R. Seeber, and L.W. Comeau, A Time-Sharing System Using an Associative Memory. Proceedings of the IEEE, December 1966. 54(12): p. 1774-1779.
-
(1966)
Proceedings of the IEEE
, vol.54
, Issue.12
, pp. 1774-1779
-
-
Lindquist, A.B.1
Seeber, R.R.2
Comeau, L.W.3
-
37
-
-
84945721946
-
-
Lipner, S.B.,A comment on the confinement problem. Operating Systems Review, 19-21 November 1975. 9(5): p. 192-196. Proceedings of the Fifth Symposium on Operating Systems Principles.
-
Lipner, S.B.,A comment on the confinement problem. Operating Systems Review, 19-21 November 1975. 9(5): p. 192-196. Proceedings of the Fifth Symposium on Operating Systems Principles.
-
-
-
-
39
-
-
84879848814
-
Application and Analysis of the Virtual Machine Approach to Information System Security
-
26-27 March, Cambridge, MA: Association for Computing Machinery, p, URL
-
Madnick, S.E. and J. J. Donovan. Application and Analysis of the Virtual Machine Approach to Information System Security, in Proceedings of the ACM SIGARCH-SIGOPS Workshop on Virtual Computer Systems. 26-27 March 1973, Cambridge, MA: Association for Computing Machinery, p. 210-224. URL: http://portal.acm.org/citation.cfm?id=803961
-
(1973)
Proceedings of the ACM SIGARCH-SIGOPS Workshop on Virtual Computer Systems
, pp. 210-224
-
-
Madnick, S.E.1
Donovan, J.J.2
-
40
-
-
33751069196
-
NetTop: Commercial Technology in High Assurance Applications
-
Fall, URL
-
Meushaw, R. and D. Simard, NetTop: Commercial Technology in High Assurance Applications. National Security Agency Tech Trend Notes, Fall 2000. 9(4): p. 3-10. URL: http://www.vmwaro.coni/pdf/ TechTrondNotes.pdf
-
(2000)
National Security Agency Tech Trend Notes
, vol.9
, Issue.4
, pp. 3-10
-
-
Meushaw, R.1
Simard, D.2
-
41
-
-
0004246059
-
-
RFC 959, October, Network Working Group. URL
-
Postel, J. and J. Reynolds, File Transfer Protocol (FTP), RFC 959, October 1985, Network Working Group. URL: http://www.ietf.org/rfc/rfc959. txt
-
(1985)
File Transfer Protocol (FTP)
-
-
Postel, J.1
Reynolds, J.2
-
42
-
-
0018434466
-
Synchronization with Eventcounts and Sequencers
-
February
-
Reed, D.P. and R.K. Kanodia, Synchronization with Eventcounts and Sequencers. Comm. ACM, February 1979. 22(2): p. 115-123.
-
(1979)
Comm. ACM
, vol.22
, Issue.2
, pp. 115-123
-
-
Reed, D.P.1
Kanodia, R.K.2
-
43
-
-
0020779556
-
Distributed Secure System
-
July, URL
-
Rushby, J. and B. Randell, Distributed Secure System. IEEE Computer, July 1983.16(7): p. 55-67. URL: http://www.csl.sri.com/ users/rushby/abstracts/computer83
-
(1983)
IEEE Computer
, vol.16
, Issue.7
, pp. 55-67
-
-
Rushby, J.1
Randell, B.2
-
44
-
-
33846287428
-
-
Sailer, R., T. Jaeger, J.L. Griffin, S. Berger, L. van Doom, R. Perez, and E. Valdez, Building a General-purpose Secure Virtual Machine Monitor, RC23537 (W0502-132), 25 February 2005, IBM Research Division, Thomas J. Watson Research Center: Yorktown Heights, NY. URL: http://domino.watson.ibm.com/ library/CyberDig.nsf/home
-
Sailer, R., T. Jaeger, J.L. Griffin, S. Berger, L. van Doom, R. Perez, and E. Valdez, Building a General-purpose Secure Virtual Machine Monitor, RC23537 (W0502-132), 25 February 2005, IBM Research Division, Thomas J. Watson Research Center: Yorktown Heights, NY. URL: http://domino.watson.ibm.com/ library/CyberDig.nsf/home
-
-
-
-
45
-
-
0024664252
-
Tea and I: An Allergy
-
1-3 May, Oakland, CA: IEEE Computer Society, p
-
Schaefer, M., W.C. Barker, and C.P. Pfleeger. Tea and I: An Allergy, in IEEE Symposium on Security and Privacy. 1-3 May 1989, Oakland, CA: IEEE Computer Society, p. 178-182.
-
(1989)
IEEE Symposium on Security and Privacy
, pp. 178-182
-
-
Schaefer, M.1
Barker, W.C.2
Pfleeger, C.P.3
-
46
-
-
84958951541
-
Program Confinement in KVM/370
-
16-19 October, Seattle, WA: p
-
Schaefer, M., B. Gold, R. Linde, and J. Scheid. Program Confinement in KVM/370. in Proceedings of the 1977 ACM Annual Conference. 16-19 October 1977, Seattle, WA: p. 404-410.
-
(1977)
Proceedings of the 1977 ACM Annual Conference
, pp. 404-410
-
-
Schaefer, M.1
Gold, B.2
Linde, R.3
Scheid, J.4
-
47
-
-
0142157011
-
-
Scherzer, H., R. Canetti, P.A. Karger, H. Krawczyk, T. Rabin, and D.C. Toll. Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. in 8th European Symposium on Research in Computer Security (ESORICS 2003). 13-15 October 2003, Gjøvik, Norway:Lecture Notes in Computer Science 2808. Springer Verlag, p. 181-200.
-
Scherzer, H., R. Canetti, P.A. Karger, H. Krawczyk, T. Rabin, and D.C. Toll. Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. in 8th European Symposium on Research in Computer Security (ESORICS 2003). 13-15 October 2003, Gjøvik, Norway:Lecture Notes in Computer Science Vol. 2808. Springer Verlag, p. 181-200.
-
-
-
-
48
-
-
33748161983
-
-
NAI Labs Report #02-007, June, NAI Labs: Glenwood, MD. URL
-
Smalley, S., Configuring the SEL inux Policy, NAI Labs Report #02-007, June 2002, NAI Labs: Glenwood, MD. URL: http://www.nsa.gov/selinux/ policy2-abs.html
-
(2002)
Configuring the SEL inux Policy
-
-
Smalley, S.1
-
49
-
-
33646837783
-
VM and the VM Community: Past Present, and Future
-
August, URL
-
Varian, M. VM and the VM Community: Past Present, and Future, in SHARE 89, Sessions 9059-9061. August 1997. URL: http://pucc.princdon. edu/~melinda/25paper.pdf
-
(1997)
SHARE 89, Sessions
, pp. 9059-9061
-
-
Varian, M.1
|