-
1
-
-
2342551035
-
Flexible os support and applications for trusted computing.
-
USENIX Association, Berkeley
-
Garfinkel, T., Rosenblum, M., Boneh, D.: Flexible os support and applications for trusted computing. In: 9th conference on Hot Topics in Operating Systems, pp. 25-125 USENIX Association, Berkeley (2003)
-
(2003)
9th conference on Hot Topics in Operating Systems
, pp. 25-125
-
-
Garfinkel, T.1
Rosenblum, M.2
Boneh, D.3
-
2
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: a virtual machine-based platform for trusted computing. ACM SIGOPS Oper. Syst. Rev. 37(5), 193-206 (2003) (Pubitemid 40929697)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
5
-
-
85084162270
-
Design and implementation of a tcg-based integrity measurement architecture
-
USENIX Association, Berkeley
-
Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a tcg-based integrity measurement architecture. In: 13th conference on USENIX Security Symposium, pp. 223-238. USENIX Association, Berkeley (2004)
-
(2004)
13th conference on USENIX Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
6
-
-
33748062337
-
PRIMA: Policy-Reduced Integrity Measurement Architecture
-
SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
-
Jaeger, T., Sailer, R., Shankar, U.: Prima: policy-reduced integrity measurement architecture. In: 11th ACM symposium on Access control models and technologies, pp. 19-28. ACM Press, New York (2006) (Pubitemid 44300738)
-
(2006)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, vol.2006
, pp. 19-28
-
-
Jaeger, T.1
Sailer, R.2
Shankar, U.3
-
7
-
-
73249134721
-
National institute of standards and technology: Secure hash standard (SHA-1)
-
National Institute of Standards and Technology: Secure Hash Standard (SHA-1). pp. 180-181. Federal Information Processing Standards Publication (1993)
-
(1993)
Federal Information Processing Standards Publication
, pp. 180-181
-
-
-
8
-
-
33845427178
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
DOI 10.1145/1095809.1095812
-
Seshadri, A., Luk, M., Shi, E., Perrig, A., van Doorn, L., Khosla, P.: Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In: 20th ACM symposium on Operating systems principles, pp. 1-16. ACM Press, New York (2005) (Pubitemid 44892201)
-
(2005)
Operating Systems Review (ACM)
, vol.39
, Issue.5
, pp. 1-16
-
-
Seshadri, A.1
Perrig, A.2
Luk, M.3
Van Doom, L.4
Shi, E.5
Khosla, P.6
-
9
-
-
27544477855
-
BIND: A fine-grained attestation service for secure distributed systems
-
Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
-
Shi, E., Perrig, A., Doorn, L.V.: Bind: A fine-grained attestation service for secure distributed systems. In: 2005 IEEE Symposium on Security and Privacy, pp. 154-168. IEEE Press, Washington (2005) (Pubitemid 41543653)
-
(2005)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 154-168
-
-
Shi, E.1
Perrig, A.2
Van Doom, L.3
-
10
-
-
84926427148
-
Survey of virtual machine research
-
Goldberg, R.: Survey of Virtual Machine Research. IEEE Computer 7(6), 34-45 (1974)
-
(1974)
IEEE Computer
, vol.7
, Issue.6
, pp. 34-45
-
-
Goldberg, R.1
-
12
-
-
67650112616
-
Intel vanderpool technology for ia-32 processors(vt-x) preliminary specification.
-
Intel Corporation: Intel vanderpool technology for ia-32 processors(vt-x) preliminary specification. Technical Report, Intel C97063-001 (2005)
-
(2005)
Technical Report, Intel C97063-001
-
-
Intel Corporation1
-
13
-
-
21644433634
-
Xen and the art of virtualization
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. ACM SIGOPS Oper. Syst. Rev. 37(5), 164-177 (2003) (Pubitemid 40929695)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
14
-
-
84910156435
-
VTPM: Virtualizing the trusted platform module.
-
USENIX Association, Berkeley
-
Berger, S., Cáceres, R., Goldman, K.A., Perez, R., Sailer, R., van Doorn, L.: vtpm: Virtualizing the trusted platform module. In: 15th conference on USENIX Security Symposium, pp. 305-320. USENIX Association, Berkeley (2006)
-
(2006)
15th conference on USENIX Security Symposium
, pp. 305-320
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
15
-
-
14844295011
-
Direct anonymous attestation
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: 11th ACM conference on Computer and communications security, pp. 132-145. ACM Press, New York (2004) (Pubitemid 40338196)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
16
-
-
3042738543
-
Swatt: Software-based attestation for embedded devices
-
IEEE Press, Washington
-
Seshadri, A., Perrig, A., Doorn, L.V., Khosla, P.: Swatt: Software-based attestation for embedded devices. In: 2004 IEEE Symposium on Security and Privacy, pp. 272- 282. IEEE Press, Washington (2004)
-
(2004)
2004 IEEE Symposium on Security and Privacy
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
Doorn, L.V.3
Khosla, P.4
-
17
-
-
70349659108
-
Semantic remote attestation: A virtual machine directed approach to trusted computing.
-
USENIX Association, Berkeley
-
Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation: a virtual machine directed approach to trusted computing. In: 3rd conference on Virtual Machine Research And Technology Symposium, p. 3. USENIX Association, Berkeley (2004)
-
(2004)
3rd conference on Virtual Machine Research And Technology Symposium
, pp. 3
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
18
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
ACM Press, New York
-
Sadeghi, A.R., Stuble, C.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: 2004 workshop on New security paradigms, pp. 67-77. ACM Press, New York (2004)
-
(2004)
2004 Workshop on New Security Paradigms
, pp. 67-77
-
-
Sadeghi, A.R.1
Stuble, C.2
-
19
-
-
14844291531
-
Attestation-based policy enforcement for remote access
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
Sailer, R., Jaeger, T., Zhang, X., van Doorn, L.: Attestation-based policy enforcement for remote access. In: 11th ACM conference on Computer and communications security, pp. 308-317. ACM Press, New York (2004) (Pubitemid 40338212)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 308-317
-
-
Sailer, R.1
Jaeger, T.2
Zhang, X.3
Van Doorn, L.4
-
20
-
-
79955682848
-
Toward automated information-flow integrity verification for security-critical applications
-
Shankar, U., Jaeger, T., Sailer, R.: Toward automated information-flow integrity verification for security-critical applications. In: 2006 ISOC Networked and Distributed Systems Security Symposium, San Diego (2006)
-
(2006)
2006 ISOC Networked and Distributed Systems Security Symposium, San Diego
-
-
Shankar, U.1
Jaeger, T.2
Sailer, R.3
-
21
-
-
33748087527
-
Trusted platform on demand.
-
IBM Tokyo Research Laboratory
-
Maruyama, H., Seliger, F., Nagaratnam, N., Ebringer, T., Munetoh, S., Yoshihama, S., Nakamura, T.: Trusted platform on demand. Technical Report RT0564, IBM Tokyo Research Laboratory (2004)
-
(2004)
Technical Report RT0564
-
-
Maruyama, H.1
Seliger, F.2
Nagaratnam, N.3
Ebringer, T.4
Munetoh, S.5
Yoshihama, S.6
Nakamura, T.7
-
22
-
-
30144435491
-
Peer-to-peer access control architecture using trusted computing technology
-
DOI 10.1145/1063979.1064005, SACMAT 2005: Proceedings of 10th ACM Symposium on Access Control Models and Technologies
-
Sandhu, R., Zhang, X.: Peer-to-peer access control architecture using trusted computing technology. In: 10th ACM symposium on Access control models and technologies, pp. 147-158. ACM Press, New York (2005) (Pubitemid 43087471)
-
(2005)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, pp. 147-158
-
-
Sandhu, R.1
Zhang, X.2
-
23
-
-
34247346997
-
Secure information sharing enabled by trusted computing and PEI models
-
DOI 10.1145/1128817.1128820, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
-
Sandhu, R., Ranganathan, K., Zhang, X.: Secure information sharing enabled by trusted computing and pei models. In: 2006 ACM Symposium on Information, computer and communications security, pp. 2-12. ACM Press, New York (2006) (Pubitemid 46644718)
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
, vol.2006
, pp. 2-12
-
-
Sandhu, R.1
Ranganathan, K.2
Zhang, X.3
-
24
-
-
30144435965
-
Enhancing data authenticity and integrity in P2P systems
-
DOI 10.1109/MIC.2005.124
-
Zhang, X., Chen, S., Sandhu, R.: Enhancing data authenticity and integrity in p2p systems. IEEE Internet Computing 9(6), 42-49 (2005) (Pubitemid 43051367)
-
(2005)
IEEE Internet Computing
, vol.9
, Issue.6
, pp. 42-49
-
-
Zhang, X.1
Chen, S.2
Sandhu, R.3
-
25
-
-
33750248123
-
Building a MAC-based security architecture for the Xen open-source hypervisor
-
DOI 10.1109/CSAC.2005.13, 1565255, Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005
-
Sailer, R., Jaeger, T., Valdez, E., Caceres, R., Perez, R., Berger, S., Griffin, J.L., van Doorn, L.: Building a mac-based security architecture for the xen open-source hypervisor. In: 21st Annual Computer Security Applications Conference, pp. 276-285 IEEE Press, Washington (2005) (Pubitemid 46116484)
-
(2005)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, vol.2005
, pp. 276-285
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Caceres, R.4
Perez, R.5
Berger, S.6
Griffin, J.L.7
Van Doorn, L.8
-
26
-
-
34748906009
-
SecureBus: Towards application-transparent trusted computing with mandatory access control
-
DOI 10.1145/1229285.1229304, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
-
Zhang, X., Covington, M.J., Chen, S., Sandhu, R.: Securebus: towards applicationtransparent trusted computing with mandatory access control. In: 2nd ACM symposium on Information, computer and communications security, pp. 117-126. ACM Press, New York (2007) (Pubitemid 47479233)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
, pp. 117-126
-
-
Zhang, X.1
Covington, M.J.2
Chen, S.3
Sandhu, R.4
-
27
-
-
34250717227
-
Trusted virtual domains: Toward secure distributed services
-
Griffin, J., Jaeger, T., Perez, R., Sailer, R., van Doorn, L., Caceres, R.: Trusted virtual domains: Toward secure distributed services. In: 1st Workshop on Hot Topics in System Dependability (2005
-
(2005)
1st Workshop on Hot Topics in System Dependability
-
-
Griffin, J.1
Jaeger, T.2
Perez, R.3
Sailer, R.4
Van Doorn, L.5
Caceres, R.6
|