-
2
-
-
84885579967
-
-
SETI@Home, http://setiathome.ssl.berkeley.edu/.
-
SETI@Home
-
-
-
5
-
-
18744415544
-
Adding trusted operating system features to FreeBSD
-
TrustedBSD:, Boston, MA, USA, June 28
-
TrustedBSD: Adding trusted operating system features to FreeBSD. In Proceedings of the FREENIX Track: USENIX Annual Technical Conference, pages 15-28, Boston, MA, USA, June 28 2001.
-
(2001)
Proceedings of the FREENIX Track: USENIX Annual Technical Conference
, pp. 15-28
-
-
-
7
-
-
34748841719
-
-
Technical introduction to next-generation secure computing base (NGSCB). Microsoft WinHEC, 2003.
-
Technical introduction to next-generation secure computing base (NGSCB). Microsoft WinHEC, 2003.
-
-
-
-
8
-
-
34748886842
-
Paladin: Automated detection and containment of rootkit attacks
-
Technical Report DCS-TR-593, Rutgers University, Department of Computer Science
-
A. Baliga, L. Iftode, and X. Chen. Paladin: Automated detection and containment of rootkit attacks. Technical Report DCS-TR-593, Rutgers University, Department of Computer Science, 2006.
-
(2006)
-
-
Baliga, A.1
Iftode, L.2
Chen, X.3
-
9
-
-
0041524664
-
A logical framework for reasoning about access control models
-
E. Bertino, B. Catania, E. Ferrari, and P. Perlasca. A logical framework for reasoning about access control models. ACM Transaction on Information System Security, 6(1):71-127, 2003.
-
(2003)
ACM Transaction on Information System Security
, vol.6
, Issue.1
, pp. 71-127
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
12
-
-
34748825878
-
-
Department of Defense National Computer Security Center. Trusted Database Interpretation of the Trusted Computer Systems Eval uation Criteria, April 1991. NCSC-TG-021.
-
Department of Defense National Computer Security Center. Trusted Database Interpretation of the Trusted Computer Systems Eval uation Criteria, April 1991. NCSC-TG-021.
-
-
-
-
15
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
Bolton Landing, New York, USA, October
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, pages 193-206, Bolton Landing, New York, USA, October 1922 2003.
-
Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
16
-
-
70349659108
-
Semantic remote attestation - a virtual machine directed approach to trusted computing
-
San Jose, CA, USA, May 6-7, USENIX
-
V. Haldar, D. Chandra, and M. Franz. Semantic remote attestation - a virtual machine directed approach to trusted computing. In Proceedings of the Third virtual Machine Research and Technology Symposium, pages 29-41, San Jose, CA, USA, May 6-7 2004. USENIX.
-
(2004)
Proceedings of the Third virtual Machine Research and Technology Symposium
, pp. 29-41
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
17
-
-
0030677524
-
A logical language for expressing authorizations
-
Oakland, CA, USA
-
S. Jajodia, P. Samarati, and V. S. Subrahmanian. A logical language for expressing authorizations. In Proceedings of the IEEE Symposium On Research in Security and Privacy, pages 31-42, Oakland, CA, USA, 1997.
-
(1997)
Proceedings of the IEEE Symposium On Research in Security and Privacy
, pp. 31-42
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
-
18
-
-
33144476460
-
Detecting and categorizing kernel-level rootkits to aid future detection
-
Jan.-Feb
-
J. F. Levine, J. B. Grizzard, and H. L. Owen. Detecting and categorizing kernel-level rootkits to aid future detection. IEEE Security & Privacy, 4(1):24-32, Jan.-Feb. 2006.
-
(2006)
IEEE Security & Privacy
, vol.4
, Issue.1
, pp. 24-32
-
-
Levine, J.F.1
Grizzard, J.B.2
Owen, H.L.3
-
19
-
-
2442425355
-
Integrating flexible support for security policies into the linux operating system
-
June 25-30
-
P. Loscocco and S. Smalley. Integrating flexible support for security policies into the linux operating system. In Proceedings of USENIX Annual Technical Conference, pages 29-42, June 25-30 2001.
-
(2001)
Proceedings of USENIX Annual Technical Conference
, pp. 29-42
-
-
Loscocco, P.1
Smalley, S.2
-
20
-
-
84897114622
-
Proper: Privileged operations in a virtualised system environment
-
S. Muir, L. Peterson, M. Fiuczynski, J. Cappos, and J. Hartman. Proper: Privileged operations in a virtualised system environment. In Proceedings of Usenix Annual Technical Conference, 2005.
-
(2005)
Proceedings of Usenix Annual Technical Conference
-
-
Muir, S.1
Peterson, L.2
Fiuczynski, M.3
Cappos, J.4
Hartman, J.5
-
21
-
-
34748879728
-
-
OASIS XACML TC. Core Specification: eXtensible Access Control Markup Language (XACML), 2005.
-
OASIS XACML TC. Core Specification: eXtensible Access Control Markup Language (XACML), 2005.
-
-
-
-
22
-
-
17444421583
-
Does trusted computing remedy computer security problems?
-
R. Oppliger and R. Rytz. Does trusted computing remedy computer security problems? IEEE Security & Privacy, 3(2):16-19, 2005.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.2
, pp. 16-19
-
-
Oppliger, R.1
Rytz, R.2
-
24
-
-
34748921936
-
Building a mac-based security architecture for the xen opensource hypervisor
-
Technical report, IBM Research Report RC23629
-
R.Sailer, T. Jaeger, E. Valdez, R. Perez, S. Berger, J. L. Griffin, and L. van Doom. Building a mac-based security architecture for the xen opensource hypervisor. Technical report, IBM Research Report RC23629, 2005.
-
(2005)
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Perez, R.4
Berger, S.5
Griffin, J.L.6
van Doom, L.7
-
25
-
-
35048881059
-
Taming trusted platforms by operating system design
-
Proceedings of the 4th International Workshop for Information Security Applications, Berlin, Germany, August
-
A. Sadeghi and C Stuble. Taming trusted platforms by operating system design. In Proceedings of the 4th International Workshop for Information Security Applications, LNCS 2908, pages 286-302, Berlin, Germany, August 2003.
-
(2003)
LNCS
, vol.2908
, pp. 286-302
-
-
Sadeghi, A.1
Stuble, C.2
-
26
-
-
0027699087
-
Lattice-based access control models
-
November
-
R. Sandhu. Lattice-based access control models. IEEE Computer, 26(11), November. 1993.
-
(1993)
IEEE Computer
, vol.26
, Issue.11
-
-
Sandhu, R.1
-
27
-
-
27544477855
-
Bind: A fine-grained attestation service for secure distributed systems
-
Oakland, CA, USA, May 8-11
-
E. Shi, A. Perrig, and. L. Van Doom. Bind: a fine-grained attestation service for secure distributed systems. In Proceeedings of IEEE Symposium on Security and Privacy, pages 154-168, Oakland, CA, USA, May 8-11 2005.
-
(2005)
Proceeedings of IEEE Symposium on Security and Privacy
, pp. 154-168
-
-
Shi, E.1
Perrig, A.2
Van Doom, L.3
-
29
-
-
85084164351
-
Linux security modules: General security support for the linux kernel
-
C. Wright, C. Cowan, S. Smalley, J. Morris, and G. Kroah-Hartman. Linux security modules: General security support for the linux kernel. In Proceedings of the 11th USENIX Security Symposium, 2002.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
-
-
Wright, C.1
Cowan, C.2
Smalley, S.3
Morris, J.4
Kroah-Hartman, G.5
|