-
1
-
-
18444382358
-
The end of corporate computing
-
Carr, N.G.: The end of corporate computing. MIT Sloan Management Review 46(3), 67-73 (2005)
-
(2005)
MIT Sloan Management Review
, vol.46
, Issue.3
, pp. 67-73
-
-
Carr, N.G.1
-
2
-
-
0025137215
-
A VMM security kernel for the VAX architecture
-
IEEE Computer Society, Los Alamitos
-
Karger, P.A., Zurko, M.E., Bonin, D.W., Mason, A.H., Kahn, C.E.: A VMM security kernel for the VAX architecture. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 2-19. IEEE Computer Society, Los Alamitos (1990)
-
(1990)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 2-19
-
-
Karger, P.A.1
Zurko, M.E.2
Bonin, D.W.3
Mason, A.H.4
Kahn, C.E.5
-
3
-
-
56649085527
-
-
Trusted Computing Group: TPM Main Specification Version 1.1b (February 2002), https://www.trustedcomputinggroup.org
-
Trusted Computing Group: TPM Main Specification Version 1.1b (February 2002), https://www.trustedcomputinggroup.org
-
-
-
-
4
-
-
56649113222
-
-
Trusted Computing Group:, Version 1.2 rev, July 2007
-
Trusted Computing Group: TPM Main Specification Version 1.2 rev. 103 (July 2007), https://www.trustedcomputinggroup.org
-
Specification
, pp. 103
-
-
Main, T.P.M.1
-
5
-
-
80053150585
-
-
July 2007
-
Microsoft Corporation: Bitlocker drive encryption (July 2007), http://www.microsoft.com/technet/windowsvista/security/bitlockr.mspx
-
Bitlocker drive encryption
-
-
-
6
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
San Diego, California August
-
Sailer, R., Zhang, X., Jaeger, T., van Doom, L.: Design and implementation of a TCG-based integrity measurement architecture. In: 13th Usenix Security Symposium, San Diego, California (August 2004), pp. 223-238 (2004)
-
(2004)
13th Usenix Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
van Doom, L.4
-
7
-
-
84910156435
-
-
Berger, S., Caceres, R., Goldman, K.A., Perez, R., Sailer, R., van Doom, L.: vTPM: Virtualizing the Trusted Platform Module. In: Proceedings of the 15th USENIX Security Symposium, USENIX, August 2006, pp. 305-320 (2006)
-
Berger, S., Caceres, R., Goldman, K.A., Perez, R., Sailer, R., van Doom, L.: vTPM: Virtualizing the Trusted Platform Module. In: Proceedings of the 15th USENIX Security Symposium, USENIX, August 2006, pp. 305-320 (2006)
-
-
-
-
8
-
-
56649097759
-
-
Goldman, K., Berger, S.: TPM Main Part 3 - IBM Commands (April 2005), http: //www.research. ibm. com/secure_systems_department/projects/vtpm/ mainP3IBMCommandsrevl0.pdf
-
Goldman, K., Berger, S.: TPM Main Part 3 - IBM Commands (April 2005), http: //www.research. ibm. com/secure_systems_department/projects/vtpm/ mainP3IBMCommandsrevl0.pdf
-
-
-
-
9
-
-
51849091963
-
TPM virtualization: Building a general framework
-
Pohlmann, N, Reimer, H, eds, Vieweg, pp
-
Scarlata, V., Rozas, C., Wiseman, M., Grawrock, D., Vishik, C.: TPM virtualization: Building a general framework. In: Pohlmann, N., Reimer, H. (eds.) Trusted Computing, Vieweg, pp. 43-56 (2007)
-
(2007)
Trusted Computing
, pp. 43-56
-
-
Scarlata, V.1
Rozas, C.2
Wiseman, M.3
Grawrock, D.4
Vishik, C.5
-
10
-
-
0033293553
-
Building a high-performance, programmable secure coprocessor
-
Smith, S.W., Weingart, S.: Building a high-performance, programmable secure coprocessor. Computer Networks 31(8), 831-860 (1999)
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 831-860
-
-
Smith, S.W.1
Weingart, S.2
-
11
-
-
56649093227
-
-
Yee, B.S.: Using Secure Coprocessors. PhD thesis, School of Computer Science, Carnegie Mellon University (May 1994) CMU-CS-94-149
-
Yee, B.S.: Using Secure Coprocessors. PhD thesis, School of Computer Science, Carnegie Mellon University (May 1994) CMU-CS-94-149
-
-
-
-
12
-
-
0030672130
-
A secure and reliable bootstrap architecture
-
Oakland, CA, May, IEEE Computer Society Press, Los Alamitos
-
Arbaugh, W .A., Farber, D.J., Smith, J.M.: A secure and reliable bootstrap architecture. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1997, pp. 65-71. IEEE Computer Society Press, Los Alamitos (1997)
-
(1997)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 65-71
-
-
Arbaugh, W.A.1
Farber, D.J.2
Smith, J.M.3
-
13
-
-
21644481379
-
Bear: An open-source virtual secure coprocessor based on TCPA
-
Technical Report TR2003-471, Department of Computer Science, Dartmouth College
-
Macdonald, R., Smith, S., Marchesini, J., Wild, O.: Bear: An open-source virtual secure coprocessor based on TCPA. Technical Report TR2003-471, Department of Computer Science, Dartmouth College (2003)
-
(2003)
-
-
Macdonald, R.1
Smith, S.2
Marchesini, J.3
Wild, O.4
-
16
-
-
34547196300
-
A protocol for property-based attestation
-
ACM Press, New York
-
Chen, L., Landfermann, R., Loehr, H., Rohe, M., Sadeghi, A.R., Stiible, C.: A protocol for property-based attestation. In: STC 2006: Proceedings of the First ACM Workshop on Scalable Trusted Computing, pp. 7-16. ACM Press, New York (2006)
-
(2006)
STC 2006: Proceedings of the First ACM Workshop on Scalable Trusted Computing
, pp. 7-16
-
-
Chen, L.1
Landfermann, R.2
Loehr, H.3
Rohe, M.4
Sadeghi, A.R.5
Stiible, C.6
-
17
-
-
24644439462
-
Property attestation- scalable and privacy-friendly security assessment of peer computers
-
3548, IBM Research May
-
Poritz, J., Schunter, M., Van Herreweghen, E., Waidner, M.: Property attestation- scalable and privacy-friendly security assessment of peer computers. Technical Report RZ 3548, IBM Research (May 2004)
-
(2004)
Technical Report RZ
-
-
Poritz, J.1
Schunter, M.2
Van Herreweghen, E.3
Waidner, M.4
-
18
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
ACM Press, New York
-
Sadeghi, A.R., Stüble, C.: Property-based attestation for computing platforms: Caring about properties, not mechanisms. In: The 2004 New Security Paradigms Workshop. ACM Press, New York (2004)
-
(2004)
The 2004 New Security Paradigms Workshop
-
-
Sadeghi, A.R.1
Stüble, C.2
-
19
-
-
79959566693
-
Realizing property-based attestation and sealing with commonly available hard and software
-
ACM Press, New York
-
Kühn, U., Selhorst, M., Stüble, C.: Realizing property-based attestation and sealing with commonly available hard and software. In: STC 2007: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, pp. 50-57. ACM Press, New York (2007)
-
(2007)
STC 2007: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing
, pp. 50-57
-
-
Kühn, U.1
Selhorst, M.2
Stüble, C.3
-
20
-
-
34547205548
-
Linking remote attestation to secure tunnel endpoints
-
Goldman, K., Perez, R., Sailer, R.: Linking remote attestation to secure tunnel endpoints. In: STC 2006: Proceedings of the First ACM Workshop on Scalable Trusted Computing, pp. 21-24 (2006)
-
(2006)
STC 2006: Proceedings of the First ACM Workshop on Scalable Trusted Computing
, pp. 21-24
-
-
Goldman, K.1
Perez, R.2
Sailer, R.3
-
21
-
-
79953218276
-
A robust integrity reporting protocol for remote attestation
-
Fall, Tokyo December
-
Stumpf, F., Tafreschi, O., Röder, P., Eckert, C.: A robust integrity reporting protocol for remote attestation. In: Proceedings of the Second Workshop on Advances in Trusted Computing (WATC 2006 Fall), Tokyo (December 2006)
-
(2006)
Proceedings of the Second Workshop on Advances in Trusted Computing (WATC
-
-
Stumpf, F.1
Tafreschi, O.2
Röder, P.3
Eckert, C.4
-
22
-
-
38149014725
-
-
Asokan, N., Ekberg, J.E., Sadeghi, A.R., Stüble, C., Wolf, M.: Enabling fairer digital rights management with trusted computing. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, 4779, pp. 53-70. Springer, Heidelberg (2007)
-
Asokan, N., Ekberg, J.E., Sadeghi, A.R., Stüble, C., Wolf, M.: Enabling fairer digital rights management with trusted computing. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 53-70. Springer, Heidelberg (2007)
-
-
-
-
23
-
-
21644433634
-
-
Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Pratt, I., Warfield, A., Barham, P., Neugebauer, R.: Xen and the art of virtualization. In: Proceedings of the ACM Symposium on Operating Systems Principles, October 2003, pp. 164-177 (2003)
-
Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Pratt, I., Warfield, A., Barham, P., Neugebauer, R.: Xen and the art of virtualization. In: Proceedings of the ACM Symposium on Operating Systems Principles, October 2003, pp. 164-177 (2003)
-
-
-
-
24
-
-
54249153664
-
Towards trustworthy virtualisation environments: Xen library os security service infrastructure
-
Technical Report HPL-2007-69, Hewlett-Packard Laboratories April
-
Anderson, M.J., Moffie, M., Dalton, C.I.: Towards trustworthy virtualisation environments: Xen library os security service infrastructure. Technical Report HPL-2007-69, Hewlett-Packard Laboratories (April 2007)
-
(2007)
-
-
Anderson, M.J.1
Moffie, M.2
Dalton, C.I.3
-
25
-
-
27244444707
-
-
Verlag Friedrich Vieweg & Sohn, Wiesbaden
-
Sadeghi, A.R., Stüble, C., Pohlmann, N.: European multilateral secure computing base - open trusted computing for you and me. Datenschutz und Datensicherheit DuD, Verlag Friedrich Vieweg & Sohn, Wiesbaden 28(9), 548-554 (2004)
-
(2004)
European multilateral secure computing base - open trusted computing for you and me. Datenschutz und Datensicherheit DuD
, vol.28
, Issue.9
, pp. 548-554
-
-
Sadeghi, A.R.1
Stüble, C.2
Pohlmann, N.3
-
26
-
-
56649116306
-
-
Sailer, R., Valdez, E., Jaeger, T., Perez, R., van Doom, L., Griffin, J.L., Berger, S.: sHype: Secure hypervisor approach to trusted virtualized systems. Technical Report RC23511, IBM Research Division (February 2005)
-
Sailer, R., Valdez, E., Jaeger, T., Perez, R., van Doom, L., Griffin, J.L., Berger, S.: sHype: Secure hypervisor approach to trusted virtualized systems. Technical Report RC23511, IBM Research Division (February 2005)
-
-
-
|