메뉴 건너뛰기




Volumn 4610 LNCS, Issue , 2007, Pages 372-384

Enhancing grid security using trusted virtualization

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER CRIME; GRID COMPUTING; NETWORK PROTOCOLS; USER INTERFACES; VIRTUAL REALITY;

EID: 38049040255     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-73547-2_39     Document Type: Conference Paper
Times cited : (36)

References (29)
  • 4
    • 25144500526 scopus 로고    scopus 로고
    • GridSec: Trusted grid computing with security bindings and self-defense against network worms and DDoS attacks
    • Sunderam, V.S, van Albada, G.D, Sloot, P.M.A, Dongarra, J.J, eds, ICCS, Springer, Heidelberg
    • Hwang, K., Kwok, Y.K., Song, S., Chen, M.C.Y., Chen, Y., Zhou, R., Lou, X.: GridSec: Trusted grid computing with security bindings and self-defense against network worms and DDoS attacks. In: Sunderam, V.S., van Albada, G.D., Sloot, P.M.A., Dongarra, J.J. (eds.) ICCS 2005. LNCS, vol. 3516, pp. 187-195. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3516 , pp. 187-195
    • Hwang, K.1    Kwok, Y.K.2    Song, S.3    Chen, M.C.Y.4    Chen, Y.5    Zhou, R.6    Lou, X.7
  • 7
    • 33746953456 scopus 로고    scopus 로고
    • Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques
    • Smith, M., Friese, T., Engel, M., Freisleben, B.: Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques. Journal of Parallel and Distributed Computing 66, 1189-1204 (2006)
    • (2006) Journal of Parallel and Distributed Computing , vol.66 , pp. 1189-1204
    • Smith, M.1    Friese, T.2    Engel, M.3    Freisleben, B.4
  • 13
    • 38049043284 scopus 로고    scopus 로고
    • Löhr, H., Ramasamy, H.V., Sadeghi, A.R., Schulz, S., Schunter, M., Stüble, C.: Enhancing grid security using trusted virtualization (extended version) (2007) http://www.prosee.rub.de/publications.html
    • Löhr, H., Ramasamy, H.V., Sadeghi, A.R., Schulz, S., Schunter, M., Stüble, C.: Enhancing grid security using trusted virtualization (extended version) (2007) http://www.prosee.rub.de/publications.html
  • 14
    • 38049031496 scopus 로고    scopus 로고
    • TCG Website: TPM Specification version 1.2. (2006) Available online at https://www.trustedcomputinggroup.org/specs/TPM
    • TCG Website: TPM Specification version 1.2. (2006) Available online at https://www.trustedcomputinggroup.org/specs/TPM
  • 16
    • 29244450159 scopus 로고    scopus 로고
    • Property-based attestation for computing platforms: Caring about properties, not mechanisms
    • Sadeghi, A.R., Stüble, C.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: Proc 2004 New Security Paradigms Workshop, pp. 67-77 (2004)
    • (2004) Proc 2004 New Security Paradigms Workshop , pp. 67-77
    • Sadeghi, A.R.1    Stüble, C.2
  • 17
    • 38049053967 scopus 로고    scopus 로고
    • Blue pill
    • Presented at
    • Rutkowska, J.: Blue pill. Presented at Syscan '06 (2006) http://theinvisiblethings.blogspot.com/
    • (2006) Syscan '06
    • Rutkowska, J.1
  • 21
    • 33845370375 scopus 로고    scopus 로고
    • Zhao, S., Lo, V., Gauthier-Dickey, C.: Result verification and trust-based scheduling in peer-to-peer grids. In: Proc. 5th IEEE International Conference on P2P Computing, pp. 31-38 (2005)
    • Zhao, S., Lo, V., Gauthier-Dickey, C.: Result verification and trust-based scheduling in peer-to-peer grids. In: Proc. 5th IEEE International Conference on P2P Computing, pp. 31-38 (2005)
  • 24
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • USENIX, pp
    • Sailer, R., Zhang, X., Jaeger, T., van Doom, L.: Design and implementation of a TCG-based integrity measurement architecture. In: Proc. Annual USENIX Security Symposium, USENIX, pp. 223-238 (2004)
    • (2004) Proc. Annual USENIX Security Symposium , pp. 223-238
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    van Doom, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.