메뉴 건너뛰기




Volumn , Issue , 2006, Pages 321-334

Satem: Trusted service code execution across transactions

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); COMPUTER ARCHITECTURE; NETWORK PROTOCOLS; PROBLEM SOLVING;

EID: 38949139795     PISSN: 10609857     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SRDS.2006.42     Document Type: Conference Paper
Times cited : (10)

References (33)
  • 1
    • 38949091348 scopus 로고    scopus 로고
    • http://www.w3.org/2002/ws.
  • 2
    • 38949158023 scopus 로고    scopus 로고
    • http://msdn.microsoft.com/architecture/soa.
  • 3
    • 38949211791 scopus 로고    scopus 로고
    • Apache project
    • Apache project, http://www.apache.org.
  • 4
    • 38949093807 scopus 로고    scopus 로고
    • Carnegie Mellon CERT Coordination Center
    • Carnegie Mellon CERT Coordination Center. http://www.cert.org.
  • 5
    • 38949148925 scopus 로고    scopus 로고
    • Enforcer project
    • Enforcer project, http://enforcer.sourceforge.net.
  • 6
    • 38949097757 scopus 로고    scopus 로고
    • Internet System Consortium Inc
    • Internet System Consortium Inc. http://www.isc.org/index.pl?/sw/bind/.
  • 7
    • 38949126554 scopus 로고    scopus 로고
    • Oprofile project
    • Oprofile project, http://oprofile.sourceforge.net.
  • 8
    • 38949098644 scopus 로고    scopus 로고
    • The SANS Institute
    • The SANS Institute, http://www.sans.org.
  • 16
    • 84926427148 scopus 로고
    • Survey of virtual machine research
    • June
    • R.Goldberg. Survey of virtual machine research. In IEEE Computer Magazine, June 1974.
    • (1974) IEEE Computer Magazine
    • Goldberg, R.1
  • 22
    • 85084163313 scopus 로고    scopus 로고
    • Synthesizing fast intrusion prevention/detection systems from high-level specifications
    • R. Sekar and P. Uppuluri. Synthesizing fast intrusion prevention/detection systems from high-level specifications. In Proceedings of the 8th USENIX Security Syposium, 1999.
    • (1999) Proceedings of the 8th USENIX Security Syposium
    • Sekar, R.1    Uppuluri, P.2
  • 28
    • 38949126553 scopus 로고    scopus 로고
    • Trusted Computing Group
    • Trusted Computing Group. TCG 1.2 Specifications. https://www. trustedcomputinggroup.org/.
    • TCG 1.2 Specifications
  • 29
    • 38949164724 scopus 로고    scopus 로고
    • A Recipe for Certifying High Assurance Software
    • J. Voas. A Recipe for Certifying High Assurance Software. In IEEE Software, 1999.
    • (1999) IEEE Software
    • Voas, J.1
  • 32
    • 0343421180 scopus 로고
    • Introduction to the Citadel architecture: Security in physically exposed environments
    • RC16672, IBM Thomas J. Watson Research Center
    • S. White, S. Weingart, W. Arnold, and E. Palmer. Introduction to the Citadel architecture: Security in physically exposed environments. Technical Report TR RC16672, IBM Thomas J. Watson Research Center, 1991.
    • (1991) Technical Report TR
    • White, S.1    Weingart, S.2    Arnold, W.3    Palmer, E.4
  • 33
    • 0005425231 scopus 로고
    • Using secure co-processors
    • Carnegie Mellon University, PH.D Thesis
    • B. Yee. Using secure co-processors. Technical report, Carnegie Mellon University, 1994. PH.D Thesis.
    • (1994) Technical report
    • Yee, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.