-
3
-
-
11144331806
-
-
2005. Accessed 2005
-
Cert/cc statistics 1988-2005. Accessed 2005. http://www.cert.org/stats/ cert-stats.html
-
(1988)
Cert/Cc Statistics
-
-
-
6
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In 19th ACM Symposium on Operating Systems Principles, 2003
-
(2003)
19th ACM Symposium on Operating Systems Principles
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
7
-
-
84889837965
-
Trusted virtual domains: Toward secure distributed services
-
John L. Griffin, Trent Jaeger, Ronald Perez, Reiner Sailer, Leendert van Doorn, and Ramon Caceres. Trusted virtual domains: Toward secure distributed services. In Workshop on Hot Topics in System Dependability, 2005
-
(2005)
Workshop on Hot Topics in System Dependability
-
-
John, L.1
Trent Jaeger, G.2
Perez, R.3
Sailer, R.4
Van Doorn, L.5
Caceres, R.6
-
11
-
-
84889817080
-
-
IBM BEA Systems Web services metadata exchange (wsmetadataexchange Sep
-
IBM, BEA Systems, Microsoft, SAP AG, Computer Associates, Sun Microsystems, and webMethods. Web services metadata exchange (wsmetadataexchange), Sep 2004. http://www-128.ibm.com/developerworks/ library/specification/ws-mex/.
-
(2004)
Microsoft SAP AG Computer Associates Sun Microsystems and WebMethods
-
-
-
22
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
A. Sadeghi and C. Stüble. Property-based attestation for computing platforms: Caring about properties, not mechanisms. In 2004 Workshop on New Security Paradigms (NSPW 2004), pages 67-77, 2004
-
(2004)
2004 Workshop on New Security Paradigms (NSPW 2004
, pp. 67-77
-
-
Sadeghi, A.1
Stüble, C.2
-
23
-
-
14844291531
-
Attestation-based policy enforcement for remote access
-
Oct
-
R. Sailer, T. Jaeger, X. Zhang, and L. Van Doorn. Attestation-based policy enforcement for remote access. In 11th ACM Conference on Computer and Communications Security, pages 308-317, Oct 2004
-
(2004)
11th ACM Conference on Computer and Communications Security
, pp. 308-317
-
-
Sailer, R.1
Jaeger, T.2
Zhang, X.3
Van Doorn, L.4
-
24
-
-
85084162270
-
Design and implementation of a tcg-based integrity measurement architecture
-
Aug
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a tcg-based integrity measurement architecture. In 13th USENIX Security Symposium, pages 223-238, Aug 2004
-
(2004)
13th USENIX Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
26
-
-
27544464465
-
-
Trusted Computing Group Apr Available at
-
Tcg specification architecture overview, revision 1.2. Trusted Computing Group, Apr 2004. Available at https://www.trustedcomputinggroup.org/groups/ TCG-1-0-Architecture-Overview.pdf
-
(2004)
Tcg Specification Architecture Overview, Revision 1.2
-
-
-
29
-
-
34547233942
-
Bridging the gap between inter-communication boundary and inside trusted components
-
LNCS. Springer
-
Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, and Hiroshi Maruyama. Bridging the gap between inter-communication boundary and inside trusted components. In 11th European Symposium on Research in Computer Security(ESORICS 2006), LNCS. Springer, 2006
-
(2006)
11th European Symposium on Research in Computer Security(ESORICS 2006
-
-
Watanabe, Y.1
Yoshihama, S.2
Mishina, T.3
Kudo, M.4
Maruyama, H.5
|