-
1
-
-
21044460128
-
From virtualized resources to virtual computing grids: the in-VIGO system
-
Adabala S., Chadha V., Chawla P., Figueiredo R., Jose F., Krsul I., et al. From virtualized resources to virtual computing grids: the in-VIGO system. Future Gener Comput Syst 21 6 (April, 2005)
-
(2005)
Future Gener Comput Syst
, vol.21
, Issue.6
-
-
Adabala, S.1
Chadha, V.2
Chawla, P.3
Figueiredo, R.4
Jose, F.5
Krsul, I.6
-
2
-
-
35349018338
-
-
Bair R, editor. Agarwal D, et al. (contributors). National collaboratories horizons. Report of the August 10-12, 2004. In: National Collaboratories Program Meeting. The U.S. Department of Energy Office of Science.
-
-
-
-
3
-
-
21644433634
-
-
Barham P, Dragovic B, Fraser K, Hand S, Harris T, Ho A, et al. Xen and the art of virtualization. In: Proceedings of the 19th ACM symposium on operating systems principles; 2003. p. 164-77.
-
-
-
-
4
-
-
85092890026
-
-
Chen B, Morris R. Certifying program execution with secure processors. In: Proceedings of ninth hot topics in operating systems symposium; 2003. p. 133-8.
-
-
-
-
5
-
-
34547196300
-
-
Chen L, Landfermann R, Loehr H, Rohe M, Sadeghi A-R, Stüble C. A protocol for property-based attestation. In: First ACM workshop on scalable trusted computing (STC'06); November 3, 2006. p. 7-16.
-
-
-
-
6
-
-
35348998337
-
-
Common Criteria. Available from: .
-
-
-
-
7
-
-
21644433634
-
-
Dragovic B, Fraser K, Hand S, Harris T, Ho A, Pratt I, et al. Xen and the art of virtualization. In: Proceedings of the ACM symposium on operating systems principles, Bolton Landing, NY; October 2003. p. 164-77.
-
-
-
-
8
-
-
33845414042
-
Labels and event processes in the asbestos operating system
-
ACM Press
-
Efstathopoulos P., Krohn M., VanDeBogart S., Frey C., Ziegler D., Kohler E., et al. Labels and event processes in the asbestos operating system. Proceedings of the 20th ACM symposium on operating systems principles (2005), ACM Press 17-30
-
(2005)
Proceedings of the 20th ACM symposium on operating systems principles
, pp. 17-30
-
-
Efstathopoulos, P.1
Krohn, M.2
VanDeBogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
-
9
-
-
0038305260
-
-
Figueiredo RJ, Dinda PA, Fortes JAB. A case for grid computing on virtual machines. In: Proc. 23rd international conference on distributed computing systems (ICDCS'03), Providence, RI; 2003. p. 550.
-
-
-
-
11
-
-
0032218229
-
-
Foster I, Kesselman C, Tsudik G, Tuecke S. A security architecture for computational grids. In: 5th ACM conference on computer and communications security; 1998. p. 83-92.
-
-
-
-
12
-
-
0035455653
-
The anatomy of the grid: enabling scalable virtual organizations
-
Foster I., Kesselman C., and Tuecke S. The anatomy of the grid: enabling scalable virtual organizations. Int High Perform Comput Appl 15 3 (2001) 200-222
-
(2001)
Int High Perform Comput Appl
, vol.15
, Issue.3
, pp. 200-222
-
-
Foster, I.1
Kesselman, C.2
Tuecke, S.3
-
13
-
-
21644455412
-
Terra: a virtual machine-based platform for trusted computing
-
ACM Press
-
Garfinkel T., Pfaff B., Chow J., Rosenblum M., and Boneh D. Terra: a virtual machine-based platform for trusted computing. Proceedings of the nineteenth ACM symposium on operating systems principles (2003), ACM Press 193-206
-
(2003)
Proceedings of the nineteenth ACM symposium on operating systems principles
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
14
-
-
35349008936
-
-
Globus Toolkit 4. .
-
-
-
-
15
-
-
35348997292
-
-
Haldar V, Chandra D, Franz M. Semantic remote attestation: a virtual machine directed approach to trusted computing. In: USENIX VM; 2004.
-
-
-
-
16
-
-
33947691568
-
-
Härtig H, Hohmuth M, Feske N, Helmuth C, Lackorzynski A, Mehnert F, et al., The Nizza secure-system architecture. In: Proc. of collaborate com; 2005.
-
-
-
-
18
-
-
33748062337
-
PRIMA: policy-reduced integrity measurement architecture, SAC-MAT'06
-
ACM Press, Lake Tahoe, CA, USA
-
Jaegar T., Sailer R., and Shankar U. PRIMA: policy-reduced integrity measurement architecture, SAC-MAT'06. Proceedings of the tenth ACM symposium on Access control models and technologies C9 (June 7, 2006), ACM Press, Lake Tahoe, CA, USA 19-28
-
(2006)
Proceedings of the tenth ACM symposium on Access control models and technologies
, vol.C9
, pp. 19-28
-
-
Jaegar, T.1
Sailer, R.2
Shankar, U.3
-
19
-
-
35348989610
-
-
Krsul Ivan, Ganguly Arijit, Zhang Jian, Fortes Jose AB, Figueiredo Renato JO. VMPlants: providing and managing virtual machine execution environments for grid computing. SC; 2004.
-
-
-
-
20
-
-
17544370316
-
-
Lie D, Thekkath C, Mitchell M, Lincoln P, Boneh D, Mitchell J, et al. Architectural support for copy and tamper resistant software. In: Proceeding of international conference on architectural support for programming languages and operating systems; 2000. p. 168-77.
-
-
-
-
24
-
-
34250317714
-
-
Department of Computer Science, Dartmouth College, Hanover, New Hampshire Technical Report TR2005-532
-
Marchesini J., and Smith S. SHEMP - secure hardware enhancement for MyProxy (February 2005), Department of Computer Science, Dartmouth College, Hanover, New Hampshire Technical Report TR2005-532
-
(2005)
SHEMP - secure hardware enhancement for MyProxy
-
-
Marchesini, J.1
Smith, S.2
-
27
-
-
35348997291
-
-
Open Grid Forum. Overview of the GSI. .
-
-
-
-
28
-
-
35348985833
-
-
OpenTC. Available from: .
-
-
-
-
29
-
-
1142270162
-
-
Pearson S. (Ed), Prentice Hall
-
In: Pearson S. (Ed). Trusted computing platforms (2003), Prentice Hall
-
(2003)
Trusted computing platforms
-
-
-
32
-
-
35348957732
-
The trusted computing platform emerging as industry's first comprehensive approach to IT security
-
Rau S. The trusted computing platform emerging as industry's first comprehensive approach to IT security. IDC Executive Brief (February 2006). Available from:
-
(2006)
IDC Executive Brief
-
-
Rau, S.1
-
33
-
-
35348944329
-
-
Sadeghi A-R, Stüble C. Property-based attestation for computing platforms: caring about properties, not mechanisms. In: New Security Paradigm Workshop (NSPW); 2004.
-
-
-
-
34
-
-
14844291531
-
-
Sailer Reiner, Jaeger Trent, Zhang Xiaolan, van Doorn Leendert. Attestation-based policy enforcement for remote access. In: ACM conference on computer and communications security; 2004a. p. 308-17.
-
-
-
-
35
-
-
85084162270
-
-
Sailer R, Zhang X, Jaeger T, van Doorn L. Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the 13th USENIX security symposium; 2004b. p. 223-38.
-
-
-
-
36
-
-
77955001308
-
John Linwood Griffin and Stefan Berger. sHype: a secure hypervisor approach to trusted virtualized systems
-
Sailer R., Valdez E., Jaeger T., Perez R., and van Doorn L. John Linwood Griffin and Stefan Berger. sHype: a secure hypervisor approach to trusted virtualized systems. IBM Res Rep (2005)
-
(2005)
IBM Res Rep
-
-
Sailer, R.1
Valdez, E.2
Jaeger, T.3
Perez, R.4
van Doorn, L.5
-
37
-
-
35348964005
-
-
Sailer R, Valdez E, Jaeger T, Perez R, van Doorn L, Griffin JL, et al. sHype: secure hypervisor approach to trusted virtualized systems. Technical Report RC23511, Yorktown Heights, NY: IBM TJ Watson Research Center; February 2005b.
-
-
-
-
38
-
-
30144435491
-
-
Sandhu Ravi, Zhang Xinwen. Peer-to-peer access control architecture using trusted computing technology. In: Proceedings of the 10th ACM symposium on access control models and technologies (SACMAT), Stockholm; 2005. p. 147-58.
-
-
-
-
41
-
-
33749595179
-
-
Georgia Institute of Technology, Atlanta, GA Report GIT-CERCS-04-27
-
Shi W., Lee H.-H.S., Lu C., and Ghosh M. High speed memory centric protection on software execution using one-time-pad prediction (July 2004), Georgia Institute of Technology, Atlanta, GA Report GIT-CERCS-04-27
-
(2004)
High speed memory centric protection on software execution using one-time-pad prediction
-
-
Shi, W.1
Lee, H.-H.S.2
Lu, C.3
Ghosh, M.4
-
42
-
-
84885633990
-
-
Shieh A, Williams D, Sirer E, Schneider F. Nexus: a new operating system for trustworthy computing. In: Proceedings of the 20th ACM symposium on operating systems principles, WIP Session; 2005. p. 1-9.
-
-
-
-
43
-
-
1142280988
-
-
Suh G, Clarke D, Gassend B, van Dijk M, Devadas S. AEGIS: architecture for tamper-evident and tamper-resistant processing. In: Proceedings of the 17th annual international conference on supercomputing; 2003a. p. 160-71.
-
-
-
-
44
-
-
84944412608
-
-
Suh GE, Clarke D, Gassend B, van Dijk M, Devadas S. Efficient memory integrity verification and encryption for secure processors. In: Proc. annual IEEE/ACM international symposium on microarchitecture (MICRO); 2003b. p. 339-50.
-
-
-
-
45
-
-
35348980631
-
-
TrouSerS. The open-source TCG Software Stack. .
-
-
-
-
46
-
-
35349009476
-
-
Trusted Computing Group. Available from: .
-
-
-
-
49
-
-
35349031548
-
-
The VMware software package. Available from: .
-
-
-
-
50
-
-
35349024704
-
-
Server Utilization. .
-
-
-
|