-
1
-
-
38949091348
-
-
http://www.w3.org/2002/ws.
-
-
-
-
2
-
-
38949158023
-
-
http://msdn.microsoft.com/architecture/soa.
-
-
-
-
3
-
-
38949211791
-
-
Apache project
-
Apache project, http://www.apache.org.
-
-
-
-
4
-
-
38949093807
-
-
Carnegie Mellon CERT Coordination Center
-
Carnegie Mellon CERT Coordination Center. http://www.cert.org.
-
-
-
-
5
-
-
38949148925
-
-
Enforcer project
-
Enforcer project, http://enforcer.sourceforge.net.
-
-
-
-
6
-
-
38949097757
-
-
Internet System Consortium Inc
-
Internet System Consortium Inc. http://www.isc.org/index.pl?/sw/bind/.
-
-
-
-
7
-
-
38949126554
-
-
Oprofile project
-
Oprofile project, http://oprofile.sourceforge.net.
-
-
-
-
8
-
-
38949098644
-
-
The SANS Institute
-
The SANS Institute, http://www.sans.org.
-
-
-
-
11
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding data lifetime via whole system simulation. In Proceedings of the 13th Usenix Security Symposium, 2004.
-
(2004)
Proceedings of the 13th Usenix Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
12
-
-
21644433634
-
Xen and the art of virtualization
-
B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, I. Pratt, A. Warfield, P. Barham, and R. Neugebauer. Xen and the art of virtualization. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
-
Dragovic, B.1
Fraser, K.2
Hand, S.3
Harris, T.4
Ho, A.5
Pratt, I.6
Warfield, A.7
Barham, P.8
Neugebauer, R.9
-
14
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
16
-
-
84926427148
-
Survey of virtual machine research
-
June
-
R.Goldberg. Survey of virtual machine research. In IEEE Computer Magazine, June 1974.
-
(1974)
IEEE Computer Magazine
-
-
Goldberg, R.1
-
18
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. Architectural support for copy and tamper resistant software. In Architectural Support for Programming Languages and Operating Systems, 2000.
-
(2000)
Architectural Support for Programming Languages and Operating Systems
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
22
-
-
85084163313
-
Synthesizing fast intrusion prevention/detection systems from high-level specifications
-
R. Sekar and P. Uppuluri. Synthesizing fast intrusion prevention/detection systems from high-level specifications. In Proceedings of the 8th USENIX Security Syposium, 1999.
-
(1999)
Proceedings of the 8th USENIX Security Syposium
-
-
Sekar, R.1
Uppuluri, P.2
-
23
-
-
21644444136
-
Model-carrying code: A practical approach for safe execution of untrusted applications
-
R. Sekar, V. Venkatakrishnan, S. Basu, S. Bhatkar, and D. C. DuVarney. Model-carrying code: A practical approach for safe execution of untrusted applications. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
-
Sekar, R.1
Venkatakrishnan, V.2
Basu, S.3
Bhatkar, S.4
DuVarney, D.C.5
-
24
-
-
33748537883
-
Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. V. Doom, and P. Khosla. Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms. In Proceedings of the 20th ACM Symposium on Operating Systems Principles, 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
Doom, L.V.5
Khosla, P.6
-
28
-
-
38949126553
-
-
Trusted Computing Group
-
Trusted Computing Group. TCG 1.2 Specifications. https://www. trustedcomputinggroup.org/.
-
TCG 1.2 Specifications
-
-
-
29
-
-
38949164724
-
A Recipe for Certifying High Assurance Software
-
J. Voas. A Recipe for Certifying High Assurance Software. In IEEE Software, 1999.
-
(1999)
IEEE Software
-
-
Voas, J.1
-
32
-
-
0343421180
-
Introduction to the Citadel architecture: Security in physically exposed environments
-
RC16672, IBM Thomas J. Watson Research Center
-
S. White, S. Weingart, W. Arnold, and E. Palmer. Introduction to the Citadel architecture: Security in physically exposed environments. Technical Report TR RC16672, IBM Thomas J. Watson Research Center, 1991.
-
(1991)
Technical Report TR
-
-
White, S.1
Weingart, S.2
Arnold, W.3
Palmer, E.4
-
33
-
-
0005425231
-
Using secure co-processors
-
Carnegie Mellon University, PH.D Thesis
-
B. Yee. Using secure co-processors. Technical report, Carnegie Mellon University, 1994. PH.D Thesis.
-
(1994)
Technical report
-
-
Yee, B.1
|