-
2
-
-
84976838605
-
The PDP-11 Virtual Machine Architecture: A Case Study
-
G.J. Popek and C.S. Kline, "The PDP-11 Virtual Machine Architecture: A Case Study," Prix. 5th ACM Symp. Operating Systems Principles, vol. 9, no. 5, 1975, pp. 97-105.
-
(1975)
Prix. 5th ACM Symp. Operating Systems Principles
, vol.9
, Issue.5
, pp. 97-105
-
-
Popek, G.J.1
Kline, C.S.2
-
3
-
-
54049133255
-
-
master's thesis, Dept. Computer Science, Univ. of California, Los Angeles
-
M.D. Vahey, A Virtualizer Efficiency Device, master's thesis, Dept. Computer Science, Univ. of California, Los Angeles, 1975.
-
(1975)
A Virtualizer Efficiency Device
-
-
Vahey, M.D.1
-
5
-
-
85072542009
-
A Security Retrofit of VM/370
-
AFIPS Press
-
B.D. Gold et al., "A Security Retrofit of VM/370," APIPS Conf. Proc., vol. 48, AFIPS Press, 1979, pp. 335-344.
-
(1979)
APIPS Conf. Proc
, vol.48
, pp. 335-344
-
-
Gold, B.D.1
-
6
-
-
0026254933
-
A Retrospective on the VAX VMM Security Kernel
-
P.A. Karger et al., "A Retrospective on the VAX VMM Security Kernel," IEEE Trans. Software Eng., vol. 17, no. 11, 1991, pp. 1147-1165.
-
(1991)
IEEE Trans. Software Eng
, vol.17
, Issue.11
, pp. 1147-1165
-
-
Karger, P.A.1
-
7
-
-
0024874249
-
Multiple Operating Systems on One Processor Complex
-
T.L. Borden, J.P. Heunessy, and J.W. Rymarczyk, "Multiple Operating Systems on One Processor Complex," IBM Systems J., vol. 28, no. 1, 1989, pp. 104-123.
-
(1989)
IBM Systems J
, vol.28
, Issue.1
, pp. 104-123
-
-
Borden, T.L.1
Heunessy, J.P.2
Rymarczyk, J.W.3
-
8
-
-
12344302980
-
-
J. Alves-Foss, C. Taylor, and P. Oman, A Multi-Layered Approach to Security in High Assurance Systems, Proc. 37th Hawaii Int'l Conf. System Sciences, IEEE CS Press, 2004, p. 90302.2b; http://csdl.computer.org/ comp/ proceedings/hicss/2004/2056/09/205690302b.pdf.
-
J. Alves-Foss, C. Taylor, and P. Oman, "A Multi-Layered Approach to Security in High Assurance Systems," Proc. 37th Hawaii Int'l Conf. System Sciences, IEEE CS Press, 2004, p. 90302.2b; http://csdl.computer.org/ comp/ proceedings/hicss/2004/2056/09/205690302b.pdf.
-
-
-
-
9
-
-
23844466980
-
MILS: Architecture for HighAssurance Embedded Computing
-
W.M. Vaufleet et al., "MILS: Architecture for HighAssurance Embedded Computing" Crosstalk: J. Defense Software Eng., vol. 18, no. 8, 2005, pp. 12-16; www.stsc.hill.af.mil/crosstalk/2005/08/0508Vanfleet_etal.pdf.
-
(2005)
Crosstalk: J. Defense Software Eng
, vol.18
, Issue.8
, pp. 12-16
-
-
Vaufleet, W.M.1
-
10
-
-
33744529805
-
-
Univ. of Illinois at Chicago
-
D.J. Bernstein, "Cache-Timing Attacks on AES," Univ. of Illinois at Chicago, 2005; http://cr.yp.to/autiforgery/ cachetiming-20050414. pdf.
-
(2005)
Cache-Timing Attacks on AES
-
-
Bernstein, D.J.1
-
12
-
-
84876307879
-
On the Power of Simple Branch Prediction Analysis
-
O. Aciiçmez, Ç.K. Koç, and J.-P. Seifert, "On the Power of Simple Branch Prediction Analysis," Proc. ACM Symp. Information, Computer and Communications Security, 2007, pp. 312-320; http://islab.oregonstate.edu/koc/ papers/c40.pdf.
-
(2007)
Proc. ACM Symp. Information, Computer and Communications Security
, pp. 312-320
-
-
Aciiçmez, O.1
Koç, C.K.2
Seifert, J.-P.3
-
13
-
-
84944627047
-
Predicting Secret Keys via Brauch Prediction
-
Topics in Cryptology-CT-RSA 2007, Springer
-
O. Aciiçmez, Ç.K. Koç, and J.-P. Seifert, "Predicting Secret Keys via Brauch Prediction," Topics in Cryptology-CT-RSA 2007, LNCS 4377, Springer, 2007, pp. 225-242; http://security.ece.orst.edu/koc/papers/c39.pdf.
-
(2007)
LNCS
, vol.4377
, pp. 225-242
-
-
Aciiçmez, O.1
Koç, C.K.2
Seifert, J.-P.3
-
14
-
-
4544388201
-
Increased Information Flow Needs for High-Assurance Composite Evaluations
-
IEEE CS Press
-
P.A. Karger and H. Kurth. "Increased Information Flow Needs for High-Assurance Composite Evaluations," Proc. 2nd IEEE Int'l Information Assurance Workshop, IEEE CS Press, 2004, pp. 129-140.
-
(2004)
Proc. 2nd IEEE Int'l Information Assurance Workshop
, pp. 129-140
-
-
Karger, P.A.1
Kurth, H.2
-
17
-
-
79959681025
-
Low-Resource Routing Attacks against Tor
-
ACM Press
-
K. Bauer et al., "Low-Resource Routing Attacks against Tor," Proc. 2007 ACM Workshop Privacy in Electronic Society, , ACM Press, 2007, pp. 11-20; http://systems. cs.colorado.edu/%7Ebauerk/papers/wpes25-bauer.pdf.
-
(2007)
Proc. 2007 ACM Workshop Privacy in Electronic Society
, pp. 11-20
-
-
Bauer, K.1
-
18
-
-
84958951541
-
Program Confinement in KVM/370
-
ACM Press
-
M.B Schaefer et al., "Program Confinement in KVM/370," Proc. ACM Annual Conf., ACM Press, 1977, pp. 404-410.
-
(1977)
Proc. ACM Annual Conf
, pp. 404-410
-
-
Schaefer, M.B.1
-
19
-
-
0034809926
-
Practical Server Privacy with Secure Coprocessors
-
S.W. Smith and D. Safford, "Practical Server Privacy with Secure Coprocessors," IBM Systems J., vol. 40, no. 3, 2001, pp. 683-695.
-
(2001)
IBM Systems J
, vol.40
, Issue.3
, pp. 683-695
-
-
Smith, S.W.1
Safford, D.2
-
20
-
-
54049158076
-
KVM: The Linux Virtual Machine Monitor
-
A. Kivity et al., "KVM: The Linux Virtual Machine Monitor," Proc. Linux Symp., vol. 1, 2007, pp. 225-230; http://ols.108.redhat.com/ 2007/Reprints/nakajima -Repriut.pdf.
-
(2007)
Proc. Linux Symp
, vol.1
, pp. 225-230
-
-
Kivity, A.1
-
21
-
-
54049139569
-
-
High-bandwidth Digital Content Protection System, rev. 1.3, Digital Content Protection, 2006; www.digital-cp.com/ files/static-page_files/ 8006F925-129D-4C12-C878 99B5A76EF5C3/HDCP_Specification%20Revl_3.pdf.
-
High-bandwidth Digital Content Protection System, rev. 1.3, Digital Content Protection, 2006; www.digital-cp.com/ files/static-page_files/ 8006F925-129D-4C12-C878 99B5A76EF5C3/HDCP_Specification%20Revl_3.pdf.
-
-
-
-
22
-
-
54049104898
-
A Comparison of Trusted X Security Policies, Architectures, and Interoperability
-
IEEE CS Press
-
J. Picciotto and J. Epstein, "A Comparison of Trusted X Security Policies, Architectures, and Interoperability," Proc. 8th Ann. Computer Security Applications Conf., IEEE CS Press, 1992, pp. 142-152.
-
(1992)
Proc. 8th Ann. Computer Security Applications Conf
, pp. 142-152
-
-
Picciotto, J.1
Epstein, J.2
-
23
-
-
38149114073
-
-
publication no. 34434, Advanced Micro Devices
-
AMD I/O Virtualization Technology (IOMMU) Specification, publication no. 34434, Advanced Micro Devices, 2006; www.amd.com/us-en/assets/ content_type/white_papers_and_tech_docs/34434.pdf.
-
(2006)
AMD I/O Virtualization Technology (IOMMU) Specification
-
-
-
26
-
-
54049154274
-
-
Intel Virtualization Technology Specification for the IA-32 Intel Architecture, C97063-002, Intel, 2005.
-
Intel Virtualization Technology Specification for the IA-32 Intel Architecture, C97063-002, Intel, 2005.
-
-
-
-
28
-
-
54049094761
-
Hybrid-VirtualizationEnhanced Virtualization for Linux
-
J. Nakajima and A.K. Mallick,"Hybrid-VirtualizationEnhanced Virtualization for Linux," Proc. Linux Symp., vol. 2, 2007, pp. 87-96; http://ols.108.redhat. com/2007/Reprints/nakajima-Reprint.pdf.
-
(2007)
Proc. Linux Symp
, vol.2
, pp. 87-96
-
-
Nakajima, J.1
Mallick, A.K.2
-
29
-
-
32044450263
-
Diagnosing Performance Overheads iu the Xeu Virtual Machine Environment
-
A. Menon et al., "Diagnosing Performance Overheads iu the Xeu Virtual Machine Environment," First ACM/ Usenix Conf on Virtual Execution Environments, 2005, pp. 13-23; www.hpl.hp.com/techreports/2005/ HPL-2005-80.pdf.
-
(2005)
First ACM/ Usenix Conf on Virtual Execution Environments
, pp. 13-23
-
-
Menon, A.1
-
30
-
-
38349079971
-
XenSocket: A High-Throughput Iuterdomaiu Transport for Virtual Machines
-
ACMI IFIP/USENIX 8th Int'l Middleware Conf, Springer
-
X. Zhang et al., "XenSocket: A High-Throughput Iuterdomaiu Transport for Virtual Machines," ACMI IFIP/USENIX 8th Int'l Middleware Conf., LNCS 4834, Springer, 2007, pp. 184-203.
-
(2007)
LNCS
, vol.4834
, pp. 184-203
-
-
Zhang, X.1
-
31
-
-
0038253143
-
Improving Security and Performance for Capability Systems
-
no. 149, Univ. of Cambridge
-
P.A. Karger, Improving Security and Performance for Capability Systems, Computer Laboratory tech. report no. 149, Univ. of Cambridge, 1988; http://domino. research.ibm.coni/comni/research_people.nsf/pages/ karger.pubs.html/$FILE/trthesis.pdf.
-
(1988)
Computer Laboratory tech. report
-
-
Karger, P.A.1
|