-
1
-
-
59249096966
-
-
Berkeley DB - Oracle Embedded Database. Located at: http://www.oracle. com/database/berkeley-db/.
-
Berkeley DB - Oracle Embedded Database. Located at: http://www.oracle. com/database/berkeley-db/.
-
-
-
-
2
-
-
0003629990
-
-
Federal Information Processing Standards Publication 180-1:, Available from
-
Federal Information Processing Standards Publication 180-1: Secure Hash Standard. Available from: http://www.itl.nist.gov/fipspubs/fip180-1.htm.
-
Secure Hash Standard
-
-
-
3
-
-
0037542969
-
-
Federal Information Processing Standards Publication 197:, Available from
-
Federal Information Processing Standards Publication 197: Announcing the Advanced Encryption Standard. Available from: http://csrc.nist.gov/publications/ fips/fips197/fips-197.pdf.
-
Announcing the Advanced Encryption Standard
-
-
-
4
-
-
59249104757
-
-
FUSE: Filesystem in Userspace. Located at: http://fuse.sourceforge.net/.
-
FUSE: Filesystem in Userspace. Located at: http://fuse.sourceforge.net/.
-
-
-
-
5
-
-
59249091162
-
-
L4HQ, The L4 Headquarters. Located at
-
L4HQ - The L4 Headquarters. Located at: http://www.14hq.org/.
-
-
-
-
6
-
-
59249103637
-
-
at
-
L4Linux. Located at: http://os.inf.tu-dresden.de/L4/Linux0nL4/.
-
L4Linux. Located
-
-
-
7
-
-
59249108713
-
-
PostMark Filesystem Performance Benchmark. Located at: htt\p://www.netapp.com/tech-library/3022.html.
-
PostMark Filesystem Performance Benchmark. Located at: htt\p://www.netapp.com/tech-library/3022.html.
-
-
-
-
12
-
-
59249086664
-
-
Trusted Computing Group. Located at: https://www.trustedcomputinggroup. org.
-
Trusted Computing Group. Located at: https://www.trustedcomputinggroup. org.
-
-
-
-
13
-
-
59249097920
-
-
Trusted Computing Group: at
-
Trusted Computing Group: TPM. Located at: https://www. trustedcomputinggroup.org/groups/tpm/.
-
TPM. Located
-
-
-
14
-
-
3042683432
-
Message Authentication Using Hash Functions: The HMAC Construction
-
M. Bellare, R. Canetti, and H. Krawczyk. Message Authentication Using Hash Functions: the HMAC Construction. CryptoBytes, 2(1):12-15, 1996.
-
(1996)
CryptoBytes
, vol.2
, Issue.1
, pp. 12-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
15
-
-
59249089058
-
-
R. Coker. Bonnie++. Located at: http://www.coker.com.au/bonnie++/.
-
R. Coker. Bonnie++. Located at: http://www.coker.com.au/bonnie++/.
-
-
-
-
17
-
-
41149172549
-
-
C. Frost, M. Mammarella, E. Kohler, A. de los Reyes, S. Hovsepian, A. Matsuoka, and L. Zhang. Generalized File System Dependencies. In SOSP'07: Proceedings of Twenty-First ACM SIGOPS Symposium on Operating Systems Principles, pages 307-320, New York, NY, USA, 2007. ACM.
-
C. Frost, M. Mammarella, E. Kohler, A. de los Reyes, S. Hovsepian, A. Matsuoka, and L. Zhang. Generalized File System Dependencies. In SOSP'07: Proceedings of Twenty-First ACM SIGOPS Symposium on Operating Systems Principles, pages 307-320, New York, NY, USA, 2007. ACM.
-
-
-
-
18
-
-
34547205548
-
Linking Remote Attestation to Secure Tunnel Endpoints
-
New York, NY. USA, ACM Press
-
K. Goldman, R. Perez, and R. Sailer. Linking Remote Attestation to Secure Tunnel Endpoints. In STC'06: Proceedings of the First ACM Workshop on Scalable Trusted Computing, pages 21-24, New York, NY. USA, 2006. ACM Press.
-
(2006)
STC'06: Proceedings of the First ACM Workshop on Scalable Trusted Computing
, pp. 21-24
-
-
Goldman, K.1
Perez, R.2
Sailer, R.3
-
19
-
-
0024664205
-
A Secure Identity-Based Capability System
-
Los Alamitos, CA, USA, May, IEEE Computer Society
-
L. Gong. A Secure Identity-Based Capability System. In IEEE Symposium on Security and Privacy, pages 56-65, Los Alamitos, CA, USA,' May 1989. IEEE Computer Society.
-
(1989)
IEEE Symposium on Security and Privacy
, pp. 56-65
-
-
Gong, L.1
-
20
-
-
59249095675
-
-
V. Gough. EncFS Encrypted Filesystem. Located at: http://arg0.net/wiki/ encfs.
-
V. Gough. EncFS Encrypted Filesystem. Located at: http://arg0.net/wiki/ encfs.
-
-
-
-
21
-
-
33947691568
-
The Nizza Secure-System Architecture
-
H. Härtig, M. Hohmuth, N. Feske, C. Helmuth, A. Lackorzynski, F. Mehnert, and M. Peter. The Nizza Secure-System Architecture. In Proceedings of CollaborateCom, 2005.
-
(2005)
Proceedings of CollaborateCom
-
-
Härtig, H.1
Hohmuth, M.2
Feske, N.3
Helmuth, C.4
Lackorzynski, A.5
Mehnert, F.6
Peter, M.7
-
22
-
-
77951450625
-
Reducing TCB Size by Using Untrusted Components - Small Kernels versus Virtual-Machine Monitors
-
Leuven, Belgium, Sept
-
M. Hohmuth, M. Peter, H. Härtig, and J. S. Shapiro. Reducing TCB Size by Using Untrusted Components - Small Kernels versus Virtual-Machine Monitors. In Proceedings of the Eleventh ACM SIGOPS European Workshop, Leuven, Belgium, Sept. 2004.
-
(2004)
Proceedings of the Eleventh ACM SIGOPS European Workshop
-
-
Hohmuth, M.1
Peter, M.2
Härtig, H.3
Shapiro, J.S.4
-
23
-
-
59249088336
-
-
November 2004. Available from
-
B. Kauer. Authenticated Booting for L4, November 2004. Available from: http://os.inf.tu-dresden.de/papers-ps/kauer-beleg.pdf.
-
Authenticated Booting for L4
-
-
Kauer, B.1
-
24
-
-
77952379905
-
Secure Untrusted Data Repository (SUNDR)
-
San Francisco, CA, Dec
-
J. Li, M. Krohn, D. Mazières, and D. Shasha. Secure Untrusted Data Repository (SUNDR). In Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 121-136, San Francisco, CA, Dec. 2004.
-
(2004)
Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 121-136
-
-
Li, J.1
Krohn, M.2
Mazières, D.3
Shasha, D.4
-
25
-
-
84968422314
-
How to Build a Trusted Database System on Untrusted Storage
-
San Diego, CA, Oct
-
U. Maheshwari, R. Vingralek, and B. Shapiro. How to Build a Trusted Database System on Untrusted Storage. In Proceedings of the 4th USENIX Symposium on Operating System Design and Implementation (OSDI), pages 135-150, San Diego, CA, Oct. 2000.
-
(2000)
Proceedings of the 4th USENIX Symposium on Operating System Design and Implementation (OSDI)
, pp. 135-150
-
-
Maheshwari, U.1
Vingralek, R.2
Shapiro, B.3
-
28
-
-
59249098982
-
-
Technical Overview. Available from
-
Microsoft Corporation. Secure Startup - Full Volume Encryption: Technical Overview. Available from: http://www.microsoft.com/whdc/system/platform/ pcdesign/secure-start-tech.mspx,
-
Secure Startup - Full Volume Encryption
-
-
-
29
-
-
23944500307
-
Encrypted Watermarks and Linux Laptop Security
-
C. H. Lim and M. Yung, editors, Information Security Applications, 5th International Workshop, of, Springer
-
M.-J. O. Saarinen. Encrypted Watermarks and Linux Laptop Security. In C. H. Lim and M. Yung, editors, Information Security Applications, 5th International Workshop, volume 3325 of Lecture Notes in Computer Science, pages 27-38. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3325
, pp. 27-38
-
-
Saarinen, M.-J.O.1
-
30
-
-
34748842601
-
Reducing TCB Complexity for Security-Sensitive Applications: Three Case Studies
-
New York, NY, USA, ACM
-
L. Singaravelu, C. Pu, H. Härtig, and C. Helmuth. Reducing TCB Complexity for Security-Sensitive Applications: Three Case Studies. In EuroSys'06: Proceedings of the ACM SIGOPS/EuroSys European Conference on Computer Systems 2006, pages 161-174, New York, NY, USA, 2006. ACM.
-
(2006)
EuroSys'06: Proceedings of the ACM SIGOPS/EuroSys European Conference on Computer Systems
, pp. 161-174
-
-
Singaravelu, L.1
Pu, C.2
Härtig, H.3
Helmuth, C.4
-
33
-
-
34548015665
-
Secure File System Versioning at the Block Level
-
New York, NY, USA, ACM Press
-
J. Wires and M. J. Feeley. Secure File System Versioning at the Block Level. In EuroSys'07: Proceedings of the ACM SIGOPS/EuroSys European Conference on Computer Systems 2007, pages 203-215, New York, NY, USA, 2007. ACM Press.
-
(2007)
EuroSys'07: Proceedings of the ACM SIGOPS/EuroSys European Conference on Computer Systems
, pp. 203-215
-
-
Wires, J.1
Feeley, M.J.2
|