-
2
-
-
54249086055
-
-
Sarmenta, L., Rhodes, J., Müller, T.: TPM/J Java-based API for the Trusted Platform Module (2007), http://projects.csail.mit.edu/tc/tpmj/
-
Sarmenta, L., Rhodes, J., Müller, T.: TPM/J Java-based API for the Trusted Platform Module (2007), http://projects.csail.mit.edu/tc/tpmj/
-
-
-
-
4
-
-
54249129676
-
-
TrouSerS, An Open-Source TCG Software Stack Implementation
-
TrouSerS - An Open-Source TCG Software Stack Implementation (2007), http://trousers.sourceforge.net/
-
(2007)
-
-
-
5
-
-
29244450159
-
Property-based Attestation for Computing Platforms: Caring about Policies, not Mechanisms
-
ACM, New York
-
Sadeghi, A.-R., Stüble, C.: Property-based Attestation for Computing Platforms: Caring about Policies, not Mechanisms. In: Proceedings of the New Security Paradigm Workshop (NSPW), pp. 67-77. ACM, New York (2004)
-
(2004)
Proceedings of the New Security Paradigm Workshop (NSPW)
, pp. 67-77
-
-
Sadeghi, A.-R.1
Stüble, C.2
-
6
-
-
70349659108
-
Semantic Remote Attestation - Virtual Machine Directed Approach to Trusted Computing
-
USENIX Association
-
Haldar, V., Chandra, D., Franz, M.: Semantic Remote Attestation - Virtual Machine Directed Approach to Trusted Computing. In: Proceedings of the 3rd Virtual Machine Research and Technology Symposium, pp. 29-41. USENIX Association (2004)
-
(2004)
Proceedings of the 3rd Virtual Machine Research and Technology Symposium
, pp. 29-41
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
7
-
-
41549144136
-
-
Pirker, M., Winkler, T., Toegl, R., Vejda, T.: Trusted Computing for the Java™ Platform (2007), http://trustedjava.sourceforge.net/
-
(2007)
Trusted Computing for the Java™ Platform
-
-
Pirker, M.1
Winkler, T.2
Toegl, R.3
Vejda, T.4
-
8
-
-
54249150845
-
TCG Software Stack Specification
-
Trusted Computing Group, Version 1.2
-
Trusted Computing Group. TCG Software Stack Specification, Version 1.2 Errata A (2007), https://www.trustedcomputinggroup.org/specs/TSS/
-
(2007)
Errata A
-
-
-
9
-
-
41549131923
-
-
Trusted Computing Group
-
Trusted Computing Group. TCG Infrastructure Specifications (2007), https://www.trustedcomputinggroup.org/specs/IWG
-
(2007)
TCG Infrastructure Specifications
-
-
-
10
-
-
54249132878
-
-
Trusted Computing Group
-
Trusted Computing Group (2007), https://www.trustedcomputinggroup.org
-
(2007)
-
-
-
11
-
-
21644486314
-
-
Trusted Computing Group, Revision 1.4
-
Trusted Computing Group. TCG Specification Architecture Overview, Revision 1.4 (2007), https://www.trustedcomputinggroup.org/groups/ TCG_1_4_Architecture_Overview.pdf
-
(2007)
TCG Specification Architecture Overview
-
-
-
12
-
-
0035455653
-
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
-
Foster, I., Kesselman, C., Tuecke, S.: The Anatomy of the Grid: Enabling Scalable Virtual Organizations. Int. J. High Perform. Comput. Appl. 15(3), 200-222 (2001)
-
(2001)
Int. J. High Perform. Comput. Appl
, vol.15
, Issue.3
, pp. 200-222
-
-
Foster, I.1
Kesselman, C.2
Tuecke, S.3
-
13
-
-
0000747576
-
Multiparadigm communications in Java for grid computing
-
Getov, V., von Laszewski, G., Philippsen, M., Foster, I.: Multiparadigm communications in Java for grid computing. Communincations of the ACM 44(10), 118-125 (2001)
-
(2001)
Communincations of the ACM
, vol.44
, Issue.10
, pp. 118-125
-
-
Getov, V.1
von Laszewski, G.2
Philippsen, M.3
Foster, I.4
-
16
-
-
54249086986
-
A Practical Approach for Establishing Trust Relationships between Remote Platforms using Trusted Computing
-
Dietrich, K., Pirker, M., Vejda, T., Toegl, R., Winkler, T., Lipp, P.: A Practical Approach for Establishing Trust Relationships between Remote Platforms using Trusted Computing. In: Proceedings of the 2007 Symposium on Trustworthy Global Computing (in print, 2007)
-
(2007)
Proceedings of the 2007 Symposium on Trustworthy Global Computing (in print
-
-
Dietrich, K.1
Pirker, M.2
Vejda, T.3
Toegl, R.4
Winkler, T.5
Lipp, P.6
-
17
-
-
54249113887
-
Attestation: Evidence and Trust
-
Technical report 07 0186, MITRE Corporation
-
Sheehy, J., Coker, G., Guttman, J., Loscocco, P., Herzog, A., Millen, J., Monk, L., Ramsdell, J., Sniffen, B.: Attestation: Evidence and Trust. Technical report 07 0186, MITRE Corporation (2007)
-
(2007)
-
-
Sheehy, J.1
Coker, G.2
Guttman, J.3
Loscocco, P.4
Herzog, A.5
Millen, J.6
Monk, L.7
Ramsdell, J.8
Sniffen, B.9
-
18
-
-
79959566693
-
Realizing Property-Based Attestation and Sealing with Commonly Available Hard- and Software
-
ACM, New York
-
Kühn, U., Selhorst, M., Stüble, C.: Realizing Property-Based Attestation and Sealing with Commonly Available Hard- and Software. In: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, pp. 50-57. ACM, New York (2007)
-
(2007)
Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing
, pp. 50-57
-
-
Kühn, U.1
Selhorst, M.2
Stüble, C.3
-
19
-
-
34547196300
-
A Protocol for Property-Based Attestation
-
ACM, New York
-
Chen, L., Landfermann, R., Löhr, H., Rohe, M., Sadeghi, A.-R.: A Protocol for Property-Based Attestation. In: STC 2006: Proceedings of the first ACM workshop on Scalable trusted computing, pp. 7-16. ACM, New York (2006)
-
(2006)
STC 2006: Proceedings of the first ACM workshop on Scalable trusted computing
, pp. 7-16
-
-
Chen, L.1
Landfermann, R.2
Löhr, H.3
Rohe, M.4
Sadeghi, A.-R.5
-
20
-
-
38049040255
-
-
Loehr, H., Ramasamy, H., Sadeghi, A.-R., Schulz, S., Schunter, M., Stueble, C.: Enhancing Grid Security Using Trusted Virtualization. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, 4610, pp. 372-384. Springer, Heidelberg (2007)
-
Loehr, H., Ramasamy, H., Sadeghi, A.-R., Schulz, S., Schunter, M., Stueble, C.: Enhancing Grid Security Using Trusted Virtualization. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol. 4610, pp. 372-384. Springer, Heidelberg (2007)
-
-
-
-
22
-
-
33746953456
-
Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques
-
Smith, M., Friese, T., Engel, M., Freisleben, B.: Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques. J. Parallel Distrib. Comput. 66(9), 1189-1204 (2006)
-
(2006)
J. Parallel Distrib. Comput
, vol.66
, Issue.9
, pp. 1189-1204
-
-
Smith, M.1
Friese, T.2
Engel, M.3
Freisleben, B.4
-
23
-
-
34250346420
-
Daonity: Grid security with behaviour conformity from trusted computing
-
ACM, New York
-
Mao, W., Yan, F., Chen, C.: Daonity: grid security with behaviour conformity from trusted computing. In: Proceedings of the First ACM Workshop on Scalable Trusted Computing (STC 2006), pp. 43-46. ACM, New York (2006)
-
(2006)
Proceedings of the First ACM Workshop on Scalable Trusted Computing (STC
, pp. 43-46
-
-
Mao, W.1
Yan, F.2
Chen, C.3
-
24
-
-
84887507059
-
Going beyond the sandbox: An overview of the new security architecture in the javaTM development Kit 1.2
-
USENIX Association
-
Gong, L., Mueller, M., Prafullchandra, H., Schemers, R.: Going beyond the sandbox: an overview of the new security architecture in the javaTM development Kit 1.2. In: Proceedings of the USENIX Symposium on Internet Technologies and Systems, pp. 103-112. USENIX Association (1997)
-
(1997)
Proceedings of the USENIX Symposium on Internet Technologies and Systems
, pp. 103-112
-
-
Gong, L.1
Mueller, M.2
Prafullchandra, H.3
Schemers, R.4
-
25
-
-
54249099888
-
-
Berger, S., Cáceres, R., Goldman, K., Perez, R., Sailer, R., van Doom, L.: vTPM: Virtualizing the Trusted Platform Module. IBM Research Report, RC23879 (W0602-126) (2006)
-
Berger, S., Cáceres, R., Goldman, K., Perez, R., Sailer, R., van Doom, L.: vTPM: Virtualizing the Trusted Platform Module. IBM Research Report, RC23879 (W0602-126) (2006)
-
-
-
-
28
-
-
84881384224
-
Sealing, Encapsulation, and Mutability
-
Springer, Heidelberg
-
Biberstein, M., Gil, J., Porat, S.: Sealing, Encapsulation, and Mutability. In: Proceedings of the 15th European Conference on Object-Oriented Programming, pp. 28-52. Springer, Heidelberg (2001)
-
(2001)
Proceedings of the 15th European Conference on Object-Oriented Programming
, pp. 28-52
-
-
Biberstein, M.1
Gil, J.2
Porat, S.3
-
29
-
-
0041720214
-
Signing, Sealing, and Guarding Java Objects
-
Springer, Heidelberg
-
Gong, L., Schemers, R.: Signing, Sealing, and Guarding Java Objects. In: Mobile Agents and Security, pp. 206-216. Springer, Heidelberg (1998)
-
(1998)
Mobile Agents and Security
, pp. 206-216
-
-
Gong, L.1
Schemers, R.2
-
30
-
-
33748062337
-
PRIMA: Policy-reduced integrity measurement architecture
-
ACM, New York
-
Jaeger, T., Sailer, R., Shankar, U.: PRIMA: policy-reduced integrity measurement architecture. In: Proceedings of the eleventh ACM symposium on Access control models and technologies (SACMAT 2006), pp. 19-28. ACM, New York (2006)
-
(2006)
Proceedings of the eleventh ACM symposium on Access control models and technologies (SACMAT
, pp. 19-28
-
-
Jaeger, T.1
Sailer, R.2
Shankar, U.3
-
31
-
-
54249153664
-
Towards Trustworthy Virtualisation Environments: Xen Library OS Security Service Infrastructure
-
HPL-2007-69
-
Anderson, M.J., Moffie, M., Dalton, C.L: Towards Trustworthy Virtualisation Environments: Xen Library OS Security Service Infrastructure. HP Research Report, HPL-2007-69 (2007)
-
(2007)
HP Research Report
-
-
Anderson, M.J.1
Moffie, M.2
Dalton, C.L.3
|