-
1
-
-
55849094622
-
Trusted Comput Group specifications
-
Trusted Computing Group, Tech. Rep
-
Trusted Computing Group, "Trusted Comput Group specifications," https://www.trustedcomputinggroup.org/specs/, Tech. Rep., 2008.
-
(2008)
-
-
-
2
-
-
55849122202
-
Trusted Platform Module (TPM) specifications
-
Trusted Computing Group, Tech. Rep
-
Trusted Computing Group, "Trusted Platform Module (TPM) specifications," https://www.trustedcomputinggroup.org/specs/TPM, Tech. Rep., 2008.
-
(2008)
-
-
-
3
-
-
14844291531
-
Attestation-based policy enforcement for remote access
-
New York, NY, USA: ACM Press
-
R. Sailer, T. Jaeger, X. Zhang, and L. van Doorn, "Attestation-based policy enforcement for remote access," in CCS '04: Proceedings of the 11th ACM conference on Computer and communications security. New York, NY, USA: ACM Press, 2004, pp. 308-317.
-
(2004)
CCS '04: Proceedings of the 11th ACM conference on Computer and communications security
, pp. 308-317
-
-
Sailer, R.1
Jaeger, T.2
Zhang, X.3
van Doorn, L.4
-
4
-
-
37149035513
-
An Approach to a Trustworthy System Architecture using Virtualization
-
Proceedings of the 4th International Conference on Autonomic and Trusted Computing ATC-2007, Hong Kong, China: Springer-Verlag, pp. pp
-
F. Stumpf, M. Benz, M. Hermanowski, and C. Eckert, "An Approach to a Trustworthy System Architecture using Virtualization," in Proceedings of the 4th International Conference on Autonomic and Trusted Computing (ATC-2007), ser. Lecture Notes in Computer Science, vol. 4158. Hong Kong, China: Springer-Verlag, 2007, pp. pp. 191-202.
-
ser. Lecture Notes in Computer Science
, vol.4158
-
-
Stumpf, F.1
Benz, M.2
Hermanowski, M.3
Eckert, C.4
-
5
-
-
84910156435
-
vtpm: Virtualizing the trusted platform module
-
Berkeley, CA, USA: USENIX Association
-
S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn, "vtpm: virtualizing the trusted platform module," in USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2006, pp. 21-21.
-
(2006)
USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium
, pp. 21-21
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
van Doorn, L.6
-
6
-
-
55849084187
-
Play it once again, sam - enforcing stateful licenses on open platforms
-
Tokyo, Japan, November
-
A.-R. Sadeghi, M. Scheibel, C. Stüble, and M. Wolf, "Play it once again, sam - enforcing stateful licenses on open platforms," in 2nd Workshop on Advances in Trusted Computing (WATC '06 Fall), Tokyo, Japan, November 2006.
-
(2006)
2nd Workshop on Advances in Trusted Computing (WATC '06 Fall)
-
-
Sadeghi, A.-R.1
Scheibel, M.2
Stüble, C.3
Wolf, M.4
-
8
-
-
0016082273
-
Formal requirements for virtualizable third generation architectures
-
G. J. Popek and R. P. Goldberg, "Formal requirements for virtualizable third generation architectures," Commun. ACM, vol. 17, no. 7, pp. 412-421, 1974.
-
(1974)
Commun. ACM
, vol.17
, Issue.7
, pp. 412-421
-
-
Popek, G.J.1
Goldberg, R.P.2
-
9
-
-
21644433634
-
Xen and the Art of Virtualization
-
October, Online, Available
-
B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, I. Pratt, A. Warfield, P. Barham, and R. Neugebauer, "Xen and the Art of Virtualization," in Proceedings of the ACM Symposium on Operating Systems Principles, October 2003. [Online]. Available: citeseer.ist.psu.edu/dragovic03xen.html
-
(2003)
Proceedings of the ACM Symposium on Operating Systems Principles
-
-
Dragovic, B.1
Fraser, K.2
Hand, S.3
Harris, T.4
Ho, A.5
Pratt, I.6
Warfield, A.7
Barham, P.8
Neugebauer, R.9
-
10
-
-
33646445517
-
Ngscb: A trusted open system
-
Proceedings of the 9th Australasian Conference ACISP 2004, Springer Berlin
-
M. Peinado, Y. Chen, P. England, and J. Manferdell, "Ngscb: A trusted open system," in Proceedings of the 9th Australasian Conference (ACISP 2004), ser. Lecture Notes in Computer Science. Springer Berlin, 2004, pp. 86-97.
-
(2004)
ser. Lecture Notes in Computer Science
, pp. 86-97
-
-
Peinado, M.1
Chen, Y.2
England, P.3
Manferdell, J.4
-
11
-
-
55849153050
-
-
Intel, Intel virtualization technology for directed i/o architecture specification, Intel, Tech. Rep., 2006.
-
Intel, "Intel virtualization technology for directed i/o architecture specification," Intel, Tech. Rep., 2006.
-
-
-
-
12
-
-
55849128789
-
-
Intel, Intel(r) trusted execution technology preliminary architecture specification, Tech. Rep., November 2006.
-
Intel, "Intel(r) trusted execution technology preliminary architecture specification," Tech. Rep., November 2006.
-
-
-
-
13
-
-
55849134715
-
Amd secure virtual machine architecture reference manual,
-
AMD, Tech. Rep
-
AMD, "Amd secure virtual machine architecture reference manual," Tech. Rep., 2005.
-
(2005)
-
-
-
14
-
-
33646895419
-
-
A. S. Tanenbaum, J. N. Herder, and H. Bos, Can We Make Operating Systems Reliable and Secure? Computer, 39, no. Issue 5, pp. 44-51, May 2006.
-
A. S. Tanenbaum, J. N. Herder, and H. Bos, "Can We Make Operating Systems Reliable and Secure?" Computer, vol. 39, no. Issue 5, pp. 44-51, May 2006.
-
-
-
-
15
-
-
0042349623
-
A trusted open platform
-
P. England, B. Lampson, J. Manferdelli, M. Peinado, and B. Willman, "A trusted open platform," Computer, vol. 36, no. 7, pp. 55-62, 2003.
-
(2003)
Computer
, vol.36
, Issue.7
, pp. 55-62
-
-
England, P.1
Lampson, B.2
Manferdelli, J.3
Peinado, M.4
Willman, B.5
-
16
-
-
84883516955
-
On Micro-Kernel Construction
-
New York, NY, USA: ACM Press
-
J. Liedtke, "On Micro-Kernel Construction," in SOSP '95: Proceedings of the fifteenth ACM Symposium on Operating Systems Principles. New York, NY, USA: ACM Press, 1995, pp. 237-250.
-
(1995)
SOSP '95: Proceedings of the fifteenth ACM Symposium on Operating Systems Principles
, pp. 237-250
-
-
Liedtke, J.1
-
19
-
-
20344391930
-
Intel virtualization technology
-
July
-
R. Uhlig, G. Neiger, D. Rodgers, A. L. Santoni, F. Martins, A. Anderson, S. Bennett, A. Kaegi, F. Leung, and L. Smith, "Intel virtualization technology," IEEE Computer Society, vol. 5, pp. 48-56, July 2005.
-
(2005)
IEEE Computer Society
, vol.5
, pp. 48-56
-
-
Uhlig, R.1
Neiger, G.2
Rodgers, D.3
Santoni, A.L.4
Martins, F.5
Anderson, A.6
Bennett, S.7
Kaegi, A.8
Leung, F.9
Smith, L.10
-
21
-
-
20344383743
-
Virtual Machine Monitors: Current Technology and Future Trends
-
July
-
M. Rosenblum and T. Garfinkel, "Virtual Machine Monitors: Current Technology and Future Trends," Computer, July 2005.
-
(2005)
Computer
-
-
Rosenblum, M.1
Garfinkel, T.2
-
22
-
-
55849096863
-
-
T. C. Group, TCG TPM Specification Version 1.2 Revision 103, Design Principles, Tech. Rep., July 2007.
-
T. C. Group, "TCG TPM Specification Version 1.2 Revision 103, Design Principles," Tech. Rep., July 2007.
-
-
-
-
24
-
-
84926427148
-
Survey of virtual machine research
-
June
-
R. P. Goldberg, "Survey of virtual machine research," Computer, June 1974.
-
(1974)
Computer
-
-
Goldberg, R.P.1
-
25
-
-
85084161596
-
Analysis of the intel pentium's ability to support a secure virtual machine monitor
-
Denver, CO, August 2000, Online, Available
-
J. Robin and C. Irvine, "Analysis of the intel pentium's ability to support a secure virtual machine monitor," in Proceedings of the 9th USENIX Security Symposium, Denver, CO, August 2000. [Online]. Available: citeseer.ifi.unizh.ch/robin00analysis.html
-
Proceedings of the 9th USENIX Security Symposium
-
-
Robin, J.1
Irvine, C.2
-
26
-
-
55849117619
-
-
Intel, Intel® 64 and IA-32 Architectures Software Developer's Manual 3A: System Programming Guide, Intel, Tech. Rep., February 2008.
-
Intel, "Intel® 64 and IA-32 Architectures Software Developer's Manual Volume 3A: System Programming Guide," Intel, Tech. Rep., February 2008.
-
-
-
-
27
-
-
49049096411
-
A Robust Integrity Reporting Protocol for Remote Attestation
-
Tokyo, Japan, November
-
F. Stumpf, O. Tafreschi, P. Röder, and C. Eckert, "A Robust Integrity Reporting Protocol for Remote Attestation," in Second Workshop on Advances in Trusted Computing (WATC'06 Fall), Tokyo, Japan, November 2006.
-
(2006)
Second Workshop on Advances in Trusted Computing (WATC'06 Fall)
-
-
Stumpf, F.1
Tafreschi, O.2
Röder, P.3
Eckert, C.4
-
28
-
-
79952612270
-
Beyond secure channels
-
New York, NY, USA: ACM
-
Y. Gasmi, A.-R. Sadeghi, P. Stewin, M. Unger, and N. Asokan, "Beyond secure channels," in STC '07: Proceedings of the 2007 ACM workshop on Scalable trusted computing. New York, NY, USA: ACM, 2007, pp. 30-40.
-
(2007)
STC '07: Proceedings of the 2007 ACM workshop on Scalable trusted computing
, pp. 30-40
-
-
Gasmi, Y.1
Sadeghi, A.-R.2
Stewin, P.3
Unger, M.4
Asokan, N.5
-
29
-
-
55849108386
-
-
T. C. Group, TCG TPM Specification Version 1.2 Revision 103, Commands, Tech. Rep., July 2007.
-
T. C. Group, "TCG TPM Specification Version 1.2 Revision 103, Commands," Tech. Rep., July 2007.
-
-
-
|