-
3
-
-
70349235002
-
-
Authentica Inc. Page Recall
-
Authentica Inc. Page Recall: The Key to Document Protection. http://www.adobe.com/de/products/server/policy/pdfs/ps\datasheet.pdf, 2002.
-
(2002)
The Key to Document Protection
-
-
-
4
-
-
33947130171
-
Lazy Revocation in Cryptographic File Systems
-
Washington, DC, USA, IEEE Computer Society
-
M. Backes, C. Cachin, and A. Oprea. Lazy Revocation in Cryptographic File Systems. In SISW '05: Proceedings of the Third IEEE International Security in Storage Workshop, pages 1-11, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
SISW '05: Proceedings of the Third IEEE International Security in Storage Workshop
, pp. 1-11
-
-
Backes, M.1
Cachin, C.2
Oprea, A.3
-
5
-
-
84910156435
-
-
S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn. vTPM: virtualizing the trusted platform module. In USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium, pages 21-21, Berkeley, CA, USA, 2006. USENIX Association.
-
S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn. vTPM: virtualizing the trusted platform module. In USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium, pages 21-21, Berkeley, CA, USA, 2006. USENIX Association.
-
-
-
-
6
-
-
54049153566
-
-
S. Berger, R. Caceres, D. Pendarakis, R. Sailer, E. Valdez, R. Perez, W. Schildhauer, and D. Srinivasan. TVDc: Managing Security in the Trusted Virtual Datacenter, 2008. ACM SIGOPS Operating Systems Review, 42, Issue 1.
-
S. Berger, R. Caceres, D. Pendarakis, R. Sailer, E. Valdez, R. Perez, W. Schildhauer, and D. Srinivasan. TVDc: Managing Security in the Trusted Virtual Datacenter, 2008. ACM SIGOPS Operating Systems Review, Vol 42, Issue 1.
-
-
-
-
8
-
-
70350642949
-
Trusted Virtual Domains: Secure Foundations for Business and IT Services
-
RC23792, November 2005
-
A. Bussani, J. L. Griffn, B. Jasen, K. Julisch, G. Karjoth, H. Maruyama, M. Nakamura, R. Perez, M. Schunter, A. Tanner, L. V. Doorn, E. V. Herreweghen, M. Waidner, and S. Yoshihama. Trusted Virtual Domains: Secure Foundations for Business and IT Services. Technical Report Research Report RC23792, November 2005.
-
Technical Report Research Report
-
-
Bussani, A.1
Griffn, J.L.2
Jasen, B.3
Julisch, K.4
Karjoth, G.5
Maruyama, H.6
Nakamura, M.7
Perez, R.8
Schunter, M.9
Tanner, A.10
Doorn, L.V.11
Herreweghen, E.V.12
Waidner, M.13
Yoshihama, S.14
-
9
-
-
70350673437
-
Towards Automated Provisioning of Secure Virtualized Networks
-
S. Cabuk, C. Dalton, H. Ramasamy, and M. Schunter. Towards Automated Provisioning of Secure Virtualized Networks, 2007. ACM CCS 2007.
-
(2007)
ACM CCS
, pp. 2007
-
-
Cabuk, S.1
Dalton, C.2
Ramasamy, H.3
Schunter, M.4
-
10
-
-
35248901924
-
Public key broadcast encryption for stateless receivers
-
Proceedings of the Digital Rights Management Workshop 2002, of
-
Y. Dodis and N. Fazio. Public key broadcast encryption for stateless receivers. In Proceedings of the Digital Rights Management Workshop 2002, volume 2696 of LNCS, pages 61-80, 2002.
-
(2002)
LNCS
, vol.2696
, pp. 61-80
-
-
Dodis, Y.1
Fazio, N.2
-
11
-
-
70349236529
-
-
European Multilaterally Secure Computing Base (EMSCB) Project. Towards Trustworthy Systems with Open Standards and Trusted Computing, 2008. http://www.emscb.de.
-
European Multilaterally Secure Computing Base (EMSCB) Project. Towards Trustworthy Systems with Open Standards and Trusted Computing, 2008. http://www.emscb.de.
-
-
-
-
13
-
-
79952612270
-
Beyond Secure Channels, 2007
-
Y. Gasmi, A.-R. Sadeghi, P. Stewin, M. Unger, and N. Asokan. Beyond Secure Channels, 2007. ACM Workshop on Scalable Trusted Computing 2007.
-
(2007)
ACM Workshop on Scalable Trusted Computing
-
-
Gasmi, Y.1
Sadeghi, A.-R.2
Stewin, P.3
Unger, M.4
Asokan, N.5
-
15
-
-
34250717227
-
Trusted Virtual Domains: Toward Secure Distributed Services
-
June
-
J. L. Griffin, T. Jaeger, R. Perez, R. Sailer, L. van Doorn, , and R. Cáceres. Trusted Virtual Domains: Toward Secure Distributed Services. In 1st IEEE Workshop on Hot Topics in System Dependability, June 2005.
-
(2005)
1st IEEE Workshop on Hot Topics in System Dependability
-
-
Griffin, J.L.1
Jaeger, T.2
Perez, R.3
Sailer, R.4
van Doorn, L.5
Cáceres, R.6
-
16
-
-
70349659108
-
Semantic remote attestation: A virtual machine directed approach to trusted computing
-
Berkeley, CA, USA, USENIX Association
-
V. Haldar, D. Chandra, and M. Franz. Semantic remote attestation: a virtual machine directed approach to trusted computing. In VM'04: Proceedings of the 3rd conference on Virtual Machine Research And Technology Symposium, pages 3-3, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
VM'04: Proceedings of the 3rd conference on Virtual Machine Research And Technology Symposium
, pp. 3-3
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
17
-
-
33748062337
-
PRIMA: Policy-reduced integrity measurement architecture
-
New York, NY, USA, ACM
-
T. Jaeger, R. Sailer, and U. Shankar. PRIMA: policy-reduced integrity measurement architecture. In SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies, pages 19-28, New York, NY, USA, 2006. ACM.
-
(2006)
SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies
, pp. 19-28
-
-
Jaeger, T.1
Sailer, R.2
Shankar, U.3
-
18
-
-
70349233421
-
-
Y. Katsuno, M. Kudo, P. Perez, and R. Sailer. Towards Multi-Layer Trusted Virtual Domains, 2006. The 2nd Workshop on Advances in Trusted Computing.
-
Y. Katsuno, M. Kudo, P. Perez, and R. Sailer. Towards Multi-Layer Trusted Virtual Domains, 2006. The 2nd Workshop on Advances in Trusted Computing.
-
-
-
-
22
-
-
70349248967
-
-
Microsoft. Microsoft Windows Rights Management Services for Windows Server 2003 - Helping Organizations Safeguard Digital Information from Unauthorized Use. Whitepaper, 2003.
-
Microsoft. Microsoft Windows Rights Management Services for Windows Server 2003 - Helping Organizations Safeguard Digital Information from Unauthorized Use. Whitepaper, 2003.
-
-
-
-
23
-
-
84949513306
-
Security architectures for controlled digital information dissemination
-
Washington, DC, USA, IEEE Computer Society
-
J. Park, R. Sandhu, and J. Schifalacqua. Security architectures for controlled digital information dissemination. In ACSAC '00: Proceedings of the 16th Annual Computer Security Applications Conference, page 224, Washington, DC, USA, 2000. IEEE Computer Society.
-
(2000)
ACSAC '00: Proceedings of the 16th Annual Computer Security Applications Conference
, pp. 224
-
-
Park, J.1
Sandhu, R.2
Schifalacqua, J.3
-
26
-
-
38149099299
-
-
October
-
A. Sadeghi, M. Wolf, C. Stüble, N. Asokan, and J. Ekberg. Enabling Fairer Digital Rights Management with Trusted Computing, October 2007.
-
(2007)
Enabling Fairer Digital Rights Management with Trusted Computing
-
-
Sadeghi, A.1
Wolf, M.2
Stüble, C.3
Asokan, N.4
Ekberg, J.5
-
27
-
-
33750248123
-
Building a MAC-based Security Architecture for the Xen Opensource Hypervisor
-
Dec
-
R. Sailer, T. Jaeger, E. Valdez, R. Cáceres, R. Perez, S. Berger, J. L.Grin, and L. van Doorn. Building a MAC-based Security Architecture for the Xen Opensource Hypervisor. In 21st Annual Computer Security Applications Conference (ACSAC), Dec 2005.
-
(2005)
21st Annual Computer Security Applications Conference (ACSAC)
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Cáceres, R.4
Perez, R.5
Berger, S.6
Grin, J.L.7
van Doorn, L.8
-
28
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
Berkeley, CA, USA, USENIX Association
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium, pages 16-16, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium
, pp. 16-16
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
van Doorn, L.4
-
29
-
-
34247346997
-
Secure information sharing enabled by Trusted Computing and PEI models
-
New York, NY, USA, ACM
-
R. Sandhu, K. Ranganathan, and X. Zhang. Secure information sharing enabled by Trusted Computing and PEI models. In ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pages 2-12, New York, NY, USA, 2006. ACM.
-
(2006)
ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security
, pp. 2-12
-
-
Sandhu, R.1
Ranganathan, K.2
Zhang, X.3
-
30
-
-
30144435491
-
Peer-to-peer access control architecture using trusted computing technology
-
New York, NY, USA, ACM
-
R. Sandhu and X. Zhang. Peer-to-peer access control architecture using trusted computing technology. In SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies, pages 147-158, New York, NY, USA, 2005. ACM.
-
(2005)
SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies
, pp. 147-158
-
-
Sandhu, R.1
Zhang, X.2
-
31
-
-
38049010839
-
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment
-
May
-
S. Schechter, R. Greenstadt, and M. Smith. Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment. In The Second Annual Workshop on Economics and Information Security, May 2003.
-
(2003)
The Second Annual Workshop on Economics and Information Security
-
-
Schechter, S.1
Greenstadt, R.2
Smith, M.3
-
33
-
-
11244334377
-
Towards a Multi-dimensional Characterization of Dissemination Control. In POLICY '04
-
Washington, DC, USA, IEEE Computer Society
-
R. Thomas and R. Sandhu. Towards a Multi-dimensional Characterization of Dissemination Control. In POLICY '04: Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, page 197, Washington, DC, USA, 2004. IEEE Computer Society.
-
(2004)
Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks
, pp. 197
-
-
Thomas, R.1
Sandhu, R.2
-
34
-
-
70349236530
-
-
Trusted Computing Group. TCG Specication Architecture Overview. Trusted Computing Group: https://www.trustedcomputinggroup.org/groups/TCG-1-3- Architecture-Overview.pdf, Mar. 2003. Specication Revision 1.3 28th March 2007.
-
Trusted Computing Group. TCG Specication Architecture Overview. Trusted Computing Group: https://www.trustedcomputinggroup.org/groups/TCG-1-3- Architecture-Overview.pdf, Mar. 2003. Specication Revision 1.3 28th March 2007.
-
-
-
-
35
-
-
70349256836
-
-
Trusted Computing Group, November 2003
-
Trusted Computing Group. TPM Main Specication v1.2. https://www. trustedcomputinggroup.org, November 2003.
-
TPM Main Specication v1.2
-
-
|