메뉴 건너뛰기




Volumn , Issue , 2007, Pages 117-126

SecureBus: Towards application-transparent trusted computing with mandatory access control

Author keywords

Mandatory access control; Secure platform; SecureBus; Trusted computing

Indexed keywords

COMPUTER OPERATING SYSTEMS; INFORMATION RETRIEVAL; LEGACY SYSTEMS; PARALLEL PROCESSING SYSTEMS; USER INTERFACES;

EID: 34748906009     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1229285.1229304     Document Type: Conference Paper
Times cited : (25)

References (29)
  • 2
    • 84885579967 scopus 로고    scopus 로고
    • SETI@Home, http://setiathome.ssl.berkeley.edu/.
    • SETI@Home
  • 5
    • 18744415544 scopus 로고    scopus 로고
    • Adding trusted operating system features to FreeBSD
    • TrustedBSD:, Boston, MA, USA, June 28
    • TrustedBSD: Adding trusted operating system features to FreeBSD. In Proceedings of the FREENIX Track: USENIX Annual Technical Conference, pages 15-28, Boston, MA, USA, June 28 2001.
    • (2001) Proceedings of the FREENIX Track: USENIX Annual Technical Conference , pp. 15-28
  • 7
    • 34748841719 scopus 로고    scopus 로고
    • Technical introduction to next-generation secure computing base (NGSCB). Microsoft WinHEC, 2003.
    • Technical introduction to next-generation secure computing base (NGSCB). Microsoft WinHEC, 2003.
  • 8
    • 34748886842 scopus 로고    scopus 로고
    • Paladin: Automated detection and containment of rootkit attacks
    • Technical Report DCS-TR-593, Rutgers University, Department of Computer Science
    • A. Baliga, L. Iftode, and X. Chen. Paladin: Automated detection and containment of rootkit attacks. Technical Report DCS-TR-593, Rutgers University, Department of Computer Science, 2006.
    • (2006)
    • Baliga, A.1    Iftode, L.2    Chen, X.3
  • 12
    • 34748825878 scopus 로고    scopus 로고
    • Department of Defense National Computer Security Center. Trusted Database Interpretation of the Trusted Computer Systems Eval uation Criteria, April 1991. NCSC-TG-021.
    • Department of Defense National Computer Security Center. Trusted Database Interpretation of the Trusted Computer Systems Eval uation Criteria, April 1991. NCSC-TG-021.
  • 18
    • 33144476460 scopus 로고    scopus 로고
    • Detecting and categorizing kernel-level rootkits to aid future detection
    • Jan.-Feb
    • J. F. Levine, J. B. Grizzard, and H. L. Owen. Detecting and categorizing kernel-level rootkits to aid future detection. IEEE Security & Privacy, 4(1):24-32, Jan.-Feb. 2006.
    • (2006) IEEE Security & Privacy , vol.4 , Issue.1 , pp. 24-32
    • Levine, J.F.1    Grizzard, J.B.2    Owen, H.L.3
  • 19
    • 2442425355 scopus 로고    scopus 로고
    • Integrating flexible support for security policies into the linux operating system
    • June 25-30
    • P. Loscocco and S. Smalley. Integrating flexible support for security policies into the linux operating system. In Proceedings of USENIX Annual Technical Conference, pages 29-42, June 25-30 2001.
    • (2001) Proceedings of USENIX Annual Technical Conference , pp. 29-42
    • Loscocco, P.1    Smalley, S.2
  • 21
    • 34748879728 scopus 로고    scopus 로고
    • OASIS XACML TC. Core Specification: eXtensible Access Control Markup Language (XACML), 2005.
    • OASIS XACML TC. Core Specification: eXtensible Access Control Markup Language (XACML), 2005.
  • 22
    • 17444421583 scopus 로고    scopus 로고
    • Does trusted computing remedy computer security problems?
    • R. Oppliger and R. Rytz. Does trusted computing remedy computer security problems? IEEE Security & Privacy, 3(2):16-19, 2005.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.2 , pp. 16-19
    • Oppliger, R.1    Rytz, R.2
  • 24
    • 34748921936 scopus 로고    scopus 로고
    • Building a mac-based security architecture for the xen opensource hypervisor
    • Technical report, IBM Research Report RC23629
    • R.Sailer, T. Jaeger, E. Valdez, R. Perez, S. Berger, J. L. Griffin, and L. van Doom. Building a mac-based security architecture for the xen opensource hypervisor. Technical report, IBM Research Report RC23629, 2005.
    • (2005)
    • Sailer, R.1    Jaeger, T.2    Valdez, E.3    Perez, R.4    Berger, S.5    Griffin, J.L.6    van Doom, L.7
  • 25
    • 35048881059 scopus 로고    scopus 로고
    • Taming trusted platforms by operating system design
    • Proceedings of the 4th International Workshop for Information Security Applications, Berlin, Germany, August
    • A. Sadeghi and C Stuble. Taming trusted platforms by operating system design. In Proceedings of the 4th International Workshop for Information Security Applications, LNCS 2908, pages 286-302, Berlin, Germany, August 2003.
    • (2003) LNCS , vol.2908 , pp. 286-302
    • Sadeghi, A.1    Stuble, C.2
  • 26
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • November
    • R. Sandhu. Lattice-based access control models. IEEE Computer, 26(11), November. 1993.
    • (1993) IEEE Computer , vol.26 , Issue.11
    • Sandhu, R.1
  • 27
    • 27544477855 scopus 로고    scopus 로고
    • Bind: A fine-grained attestation service for secure distributed systems
    • Oakland, CA, USA, May 8-11
    • E. Shi, A. Perrig, and. L. Van Doom. Bind: a fine-grained attestation service for secure distributed systems. In Proceeedings of IEEE Symposium on Security and Privacy, pages 154-168, Oakland, CA, USA, May 8-11 2005.
    • (2005) Proceeedings of IEEE Symposium on Security and Privacy , pp. 154-168
    • Shi, E.1    Perrig, A.2    Van Doom, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.