-
1
-
-
0035455653
-
The anatomy of the grid: Enabling scalable virtual organizations
-
Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the grid: Enabling scalable virtual organizations. International Journal of Supercomputer Applications 15, 200-222 (2001)
-
(2001)
International Journal of Supercomputer Applications
, vol.15
, pp. 200-222
-
-
Foster, I.1
Kesselman, C.2
Tuecke, S.3
-
2
-
-
0032218229
-
A security architecture for computational grids
-
Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational grids. In: Proc. 5th ACM Conference on Computer and Communications Security, pp. 83-92 (1998)
-
(1998)
Proc. 5th ACM Conference on Computer and Communications Security
, pp. 83-92
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
4
-
-
25144500526
-
GridSec: Trusted grid computing with security bindings and self-defense against network worms and DDoS attacks
-
Sunderam, V.S, van Albada, G.D, Sloot, P.M.A, Dongarra, J.J, eds, ICCS, Springer, Heidelberg
-
Hwang, K., Kwok, Y.K., Song, S., Chen, M.C.Y., Chen, Y., Zhou, R., Lou, X.: GridSec: Trusted grid computing with security bindings and self-defense against network worms and DDoS attacks. In: Sunderam, V.S., van Albada, G.D., Sloot, P.M.A., Dongarra, J.J. (eds.) ICCS 2005. LNCS, vol. 3516, pp. 187-195. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3516
, pp. 187-195
-
-
Hwang, K.1
Kwok, Y.K.2
Song, S.3
Chen, M.C.Y.4
Chen, Y.5
Zhou, R.6
Lou, X.7
-
5
-
-
4544373958
-
Understanding code mobility
-
Fuggetta, A., Picco, G.P., Vigna, G.: Understanding code mobility. IEEE Transactions on Software Engineering 24, 342-361 (1998)
-
(1998)
IEEE Transactions on Software Engineering
, vol.24
, pp. 342-361
-
-
Fuggetta, A.1
Picco, G.P.2
Vigna, G.3
-
7
-
-
33746953456
-
Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques
-
Smith, M., Friese, T., Engel, M., Freisleben, B.: Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques. Journal of Parallel and Distributed Computing 66, 1189-1204 (2006)
-
(2006)
Journal of Parallel and Distributed Computing
, vol.66
, pp. 1189-1204
-
-
Smith, M.1
Friese, T.2
Engel, M.3
Freisleben, B.4
-
10
-
-
33750248123
-
Building a MAC-based security architecture for the Xen open-source hypervisor
-
IEEE Computer Society Press, Los Alamitos
-
Sailer, R., Jaeger, T., Valdez, E., Cáceres, R., Perez, R., Berger, S., Griffin, J.L., van Doom, L.: Building a MAC-based security architecture for the Xen open-source hypervisor. In: Proc. 21st Annual Computer Security Applications Conference, IEEE Computer Society, pp. 276285. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
Proc. 21st Annual Computer Security Applications Conference, IEEE Computer Society
, pp. 276285
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Cáceres, R.4
Perez, R.5
Berger, S.6
Griffin, J.L.7
van Doom, L.8
-
11
-
-
0142250004
-
A policy based framework for access control
-
Nabhen, R., Jamhour, E., Maziero, C.: A policy based framework for access control. In: Proc. 5th International Conference on Information and Communications Security, pp. 47-59 (2003)
-
(2003)
Proc. 5th International Conference on Information and Communications Security
, pp. 47-59
-
-
Nabhen, R.1
Jamhour, E.2
Maziero, C.3
-
12
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: A virtual machine-based platform for trusted computing. In: Proc. 19th ACM Symposium on Operating Systems Principles, pp. 193-206 (2003)
-
(2003)
Proc. 19th ACM Symposium on Operating Systems Principles
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
13
-
-
38049043284
-
-
Löhr, H., Ramasamy, H.V., Sadeghi, A.R., Schulz, S., Schunter, M., Stüble, C.: Enhancing grid security using trusted virtualization (extended version) (2007) http://www.prosee.rub.de/publications.html
-
Löhr, H., Ramasamy, H.V., Sadeghi, A.R., Schulz, S., Schunter, M., Stüble, C.: Enhancing grid security using trusted virtualization (extended version) (2007) http://www.prosee.rub.de/publications.html
-
-
-
-
14
-
-
38049031496
-
-
TCG Website: TPM Specification version 1.2. (2006) Available online at https://www.trustedcomputinggroup.org/specs/TPM
-
TCG Website: TPM Specification version 1.2. (2006) Available online at https://www.trustedcomputinggroup.org/specs/TPM
-
-
-
-
15
-
-
14844295011
-
Direct anonymous attestation
-
Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proc. ACM Conference on Computer and Communications Security, pp. 132-145 (2004)
-
(2004)
Proc. ACM Conference on Computer and Communications Security
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
16
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
Sadeghi, A.R., Stüble, C.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: Proc 2004 New Security Paradigms Workshop, pp. 67-77 (2004)
-
(2004)
Proc 2004 New Security Paradigms Workshop
, pp. 67-77
-
-
Sadeghi, A.R.1
Stüble, C.2
-
17
-
-
38049053967
-
Blue pill
-
Presented at
-
Rutkowska, J.: Blue pill. Presented at Syscan '06 (2006) http://theinvisiblethings.blogspot.com/
-
(2006)
Syscan '06
-
-
Rutkowska, J.1
-
18
-
-
0013347999
-
The PERSEUS system architecture
-
3335, 93381, IBM Research
-
Pfitzmann, B., Riordan, J., Stüble, C., Waidner, M., Weber, A.: The PERSEUS system architecture. Technical Report RZ 3335 (#93381), IBM Research (2001)
-
(2001)
Technical Report RZ
-
-
Pfitzmann, B.1
Riordan, J.2
Stüble, C.3
Waidner, M.4
Weber, A.5
-
21
-
-
33845370375
-
-
Zhao, S., Lo, V., Gauthier-Dickey, C.: Result verification and trust-based scheduling in peer-to-peer grids. In: Proc. 5th IEEE International Conference on P2P Computing, pp. 31-38 (2005)
-
Zhao, S., Lo, V., Gauthier-Dickey, C.: Result verification and trust-based scheduling in peer-to-peer grids. In: Proc. 5th IEEE International Conference on P2P Computing, pp. 31-38 (2005)
-
-
-
-
22
-
-
48249117959
-
Sandboxing for a free-to-join grid with support for secure site-wide storage area
-
Cavalcanti, E., Assis, L., Gaudêncio, M., Cime, W., Brasileiro, F., Novaes, R.: Sandboxing for a free-to-join grid with support for secure site-wide storage area. In: Proc. 1st International Workshop on Virtualization Technology in Distributed Computing (2006)
-
(2006)
Proc. 1st International Workshop on Virtualization Technology in Distributed Computing
-
-
Cavalcanti, E.1
Assis, L.2
Gaudêncio, M.3
Cime, W.4
Brasileiro, F.5
Novaes, R.6
-
23
-
-
38049045448
-
Shamon: A system for distributed mandatory access control
-
McCune, J.M., Jaeger, T., Berger, S., Cáceres, R., Sailer, R.: Shamon: A system for distributed mandatory access control. In: Proc. 22nd Annual Computer Security Applications Conference, pp. 23-32 (2006)
-
(2006)
Proc. 22nd Annual Computer Security Applications Conference
, pp. 23-32
-
-
McCune, J.M.1
Jaeger, T.2
Berger, S.3
Cáceres, R.4
Sailer, R.5
-
24
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
USENIX, pp
-
Sailer, R., Zhang, X., Jaeger, T., van Doom, L.: Design and implementation of a TCG-based integrity measurement architecture. In: Proc. Annual USENIX Security Symposium, USENIX, pp. 223-238 (2004)
-
(2004)
Proc. Annual USENIX Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
van Doom, L.4
-
25
-
-
33748062337
-
PRIMA: Policy-reduced integrity measurement architecture
-
Jaeger, T., Sailer, R., Shankar, U.: PRIMA: policy-reduced integrity measurement architecture. In: Proc. 11th ACM Symposium on Access Control Models and Technologies, pp. 19-28 (2006)
-
(2006)
Proc. 11th ACM Symposium on Access Control Models and Technologies
, pp. 19-28
-
-
Jaeger, T.1
Sailer, R.2
Shankar, U.3
-
29
-
-
1542268678
-
Cryptographic security for mobile code
-
3302, 93348, IBM Research
-
Algesheimer, J., Cachin, C., Camenisch, J., Karjoth, G.: Cryptographic security for mobile code. Technical Report RZ 3302 (# 93348), IBM Research (2000)
-
(2000)
Technical Report RZ
-
-
Algesheimer, J.1
Cachin, C.2
Camenisch, J.3
Karjoth, G.4
|