-
1
-
-
85027113585
-
-
CSI/FBI computer crime and security survey 2006
-
"CSI/FBI computer crime and security survey 2006."
-
-
-
-
2
-
-
85027200176
-
-
Trusted Computing Group
-
Trusted Computing Group, https://www.trustedcomputinggroup.org/
-
-
-
-
3
-
-
0030672130
-
A secure and reliable bootstrap architecture
-
May
-
W. Arbaugh, D. Farber, and J. Smith, "A secure and reliable bootstrap architecture," Proc. IEEE Symposium on Security and Privacy, pp.65-71, May 1997.
-
(1997)
Proc. IEEE Symposium on Security and Privacy
, pp. 65-71
-
-
Arbaugh, W.1
Farber, D.2
Smith, J.3
-
4
-
-
14844291531
-
Attestation-based policy enforcement for remote access
-
R. Sailer, T. Jaeger, X. Zhang, and L. van Doorn, "Attestation-based policy enforcement for remote access," Proc. 11th ACM Conference on Computer and Communications Security (ACMCCS 2004), 2004.
-
(2004)
Proc. 11th ACM Conference on Computer and Communications Security (ACMCCS
-
-
Sailer, R.1
Jaeger, T.2
Zhang, X.3
van Doorn, L.4
-
6
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, "Terra: A virtual machine-based platform for trusted computing," 19th ACM Symposium on Operating Systems Principles, 2003.
-
(2003)
19th ACM Symposium on Operating Systems Principles
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
7
-
-
33750240268
-
Bridging the gap between inter-communication boundary and inside trusted components
-
11th European Symposium on Research in Computer Security ESORICS, Springer
-
Y. Watanabe, S. Yoshihama, T. Mishina, M. Kudo, and H. Maruyama, "Bridging the gap between inter-communication boundary and inside trusted components," 11th European Symposium on Research in Computer Security (ESORICS 2006), LNCS, Springer, 2006.
-
(2006)
LNCS
-
-
Watanabe, Y.1
Yoshihama, S.2
Mishina, T.3
Kudo, M.4
Maruyama, H.5
-
8
-
-
34250717227
-
Trusted virtual domains: Toward secure distributed services
-
J.L. Griffin, T. Jaeger, R. Perez, R. Sailer, L. van Doorn, and R. Caceres, "Trusted virtual domains: Toward secure distributed services," Workshop on Hot Topics in System Dependability, 2005.
-
(2005)
Workshop on Hot Topics in System Dependability
-
-
Griffin, J.L.1
Jaeger, T.2
Perez, R.3
Sailer, R.4
van Doorn, L.5
Caceres, R.6
-
10
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
A. Sadeghi and C. Stüble, "Property-based attestation for computing platforms: Caring about properties, not mechanisms," 2004 Workshop on New Security Paradigms (NSPW 2004), pp.67-77, 2004.
-
(2004)
2004 Workshop on New Security Paradigms (NSPW
, pp. 67-77
-
-
Sadeghi, A.1
Stüble, C.2
-
11
-
-
24644439462
-
Property attestation - Scalable and privacy-friendly assessment of peer computers,
-
Technical Report RZ3548, IBM Research Report
-
M.E. Van Herreweghen, J. Poritz, and M.Waidner, "Property attestation - Scalable and privacy-friendly assessment of peer computers," Technical Report RZ3548, IBM Research Report, 2004.
-
(2004)
-
-
Van Herreweghen, M.E.1
Poritz, J.2
Waidner, M.3
-
12
-
-
68149105674
-
WS-attestation: Enabling trusted computing on Web services
-
ed. L. Baresi and E. Di Nitto, pp, Springer Berlin Heidelberg, Sept
-
S. Yoshihama, T. Ebringer, M. Nakamura, S. Munetoh, T. Mishina, and H. Maruyama, "WS-attestation: Enabling trusted computing on Web services," in Test and Analysis of Web Services, ed. L. Baresi and E. Di Nitto, pp.441-469, Springer Berlin Heidelberg, Sept. 2007.
-
(2007)
Test and Analysis of Web Services
, pp. 441-469
-
-
Yoshihama, S.1
Ebringer, T.2
Nakamura, M.3
Munetoh, S.4
Mishina, T.5
Maruyama, H.6
-
13
-
-
85027172797
-
-
Trusted Computing Group, TPM main, version 1.2
-
Trusted Computing Group, "TPM main, version 1.2."
-
-
-
-
14
-
-
85084162270
-
Design and implementation of a tcg-based integrity measurement architecture
-
Aug
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn, "Design and implementation of a tcg-based integrity measurement architecture," 13th USENIX Security Symposium, pp.223-238, Aug. 2004.
-
(2004)
13th USENIX Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
van Doorn, L.4
-
15
-
-
85027197945
-
-
Trusted Computing Group, TCG infrastructure working group architecture Part II, Integrity management, Ver. 1.0, Rev. 1.0, Nov. 2006
-
Trusted Computing Group, "TCG infrastructure working group architecture Part II - Integrity management, Ver. 1.0, Rev. 1.0," Nov. 2006.
-
-
-
-
18
-
-
85027155224
-
-
National vulnerability database
-
"National vulnerability database." http://nvd.nist.gov/
-
-
-
-
19
-
-
85027116674
-
-
Trusted Computing Group, Trusted computing group, platform trust services PTS, Ver. 1.0, Sept. 2006
-
Trusted Computing Group, "Trusted computing group, platform trust services (PTS), Ver. 1.0," Sept. 2006.
-
-
-
-
20
-
-
85027103415
-
-
xen.org. http://xen.org/
-
"xen.org." http://xen.org/
-
-
-
-
23
-
-
70350531758
-
TCG PC client specific implementation specification for conventional BIOS, Ver 1.2
-
Trusted Computing Group, July
-
Trusted Computing Group, "TCG PC client specific implementation specification for conventional BIOS, Ver 1.2," July 2005.
-
(2005)
-
-
-
25
-
-
58049146195
-
-
"Debian security." http://www.debian.org/security/
-
Debian security
-
-
-
27
-
-
85027199452
-
-
N.I. of Advanced Industrial Science and Technology, Knoppix5.1.1 for trusted compuintg geeks. http://unit.aist.go.jp/itri/knoppix/, 2007.
-
N.I. of Advanced Industrial Science and Technology, "Knoppix5.1.1 for trusted compuintg geeks." http://unit.aist.go.jp/itri/knoppix/, 2007.
-
-
-
|