-
2
-
-
70350666255
-
-
Trusted Computing Group
-
Trusted Computing Group, http://www.trustedcomputinggroup.org/
-
-
-
-
3
-
-
85084162270
-
Design and Implementation of a TCG-based Integrity Measurement Architecture
-
Berkeley, CA, USA, USENIX Association
-
Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: SSYM 2004: Proceedings of the 13th conference on USENIX Security Symposium, Berkeley, CA, USA, USENIX Association (2004)
-
(2004)
SSYM 2004: Proceedings of the 13th conference on USENIX Security Symposium
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
van Doorn, L.4
-
4
-
-
33748062337
-
PRIMA: Policy-Reduced Integrity Measurement Architecture
-
ACM Press, New York
-
Jaeger, T., Sailer, R., Shankar, U.: PRIMA: Policy-Reduced Integrity Measurement Architecture. In: SACMAT 2006: Proceedings of the eleventh ACM Symposium on Access Control Models and Technologies, pp. 19-28. ACM Press, New York (2006)
-
(2006)
SACMAT 2006: Proceedings of the eleventh ACM Symposium on Access Control Models and Technologies
, pp. 19-28
-
-
Jaeger, T.1
Sailer, R.2
Shankar, U.3
-
5
-
-
29244450159
-
Property-based Attestation for Computing Platforms: Caring about Properties, not Mechanisms
-
ACM Press, New York
-
Sadeghi, A.R., Stüble, C.: Property-based Attestation for Computing Platforms: Caring about Properties, not Mechanisms. In: NSPW 2004: Proceedings of the 2004 Workshop on New Security Paradigms, pp. 67-77. ACM Press, New York (2004)
-
(2004)
NSPW 2004: Proceedings of the 2004 Workshop on New Security Paradigms
, pp. 67-77
-
-
Sadeghi, A.R.1
Stüble, C.2
-
6
-
-
57349085064
-
Model-based Behavioral Attestation
-
ACM Press, New York
-
Alam, M., Zhang, X., Nauman, M., Ali, T., Seifert, J.P.: Model-based Behavioral Attestation. In: SACMAT 2008: Proceedings of the thirteenth ACM symposium on Access control models and technologies. ACM Press, New York (2008)
-
(2008)
SACMAT 2008: Proceedings of the thirteenth ACM symposium on Access control models and technologies
-
-
Alam, M.1
Zhang, X.2
Nauman, M.3
Ali, T.4
Seifert, J.P.5
-
7
-
-
79959553321
-
Linux Kernel Integrity Measurement Using Contextual Inspection
-
ACM, New York
-
Loscocco, P.A., Wilson, P.W., Pendergrass, J.A., McDonell, C.D.: Linux Kernel Integrity Measurement Using Contextual Inspection. In: STC 2007: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, pp. 21-29. ACM, New York (2007)
-
(2007)
STC 2007: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing
, pp. 21-29
-
-
Loscocco, P.A.1
Wilson, P.W.2
Pendergrass, J.A.3
McDonell, C.D.4
-
8
-
-
38949184514
-
Toward a Usage-Based Security Framework for Collaborative Computing Systems
-
Zhang, X., Nakae, M., Covington, M.J., Sandhu, R.S.: Toward a Usage-Based Security Framework for Collaborative Computing Systems. ACM Trans. Inf. Syst. Secur. 11(1) (2008)
-
(2008)
ACM Trans. Inf. Syst. Secur
, vol.11
, Issue.1
-
-
Zhang, X.1
Nakae, M.2
Covington, M.J.3
Sandhu, R.S.4
-
10
-
-
33745450500
-
Formal Model and Policy Specification of Usage Control
-
Zhang, X., Parisi-Presicce, F., Sandhu, R., Park, J.: Formal Model and Policy Specification of Usage Control. ACM Trans. Inf. Syst. Secur. 8(4), 351-387 (2005)
-
(2005)
ACM Trans. Inf. Syst. Secur
, vol.8
, Issue.4
, pp. 351-387
-
-
Zhang, X.1
Parisi-Presicce, F.2
Sandhu, R.3
Park, J.4
-
11
-
-
67649670564
-
Safety Analysis of Usage Control Authorization Models
-
ACM, New York
-
Zhang, X., Sandhu, R., Parisi-Presicce, F.: Safety Analysis of Usage Control Authorization Models. In: ASIACCS 2006: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pp. 243-254. ACM, New York (2006)
-
(2006)
ASIACCS 2006: Proceedings of the 2006 ACM Symposium on Information, computer and communications security
, pp. 243-254
-
-
Zhang, X.1
Sandhu, R.2
Parisi-Presicce, F.3
-
13
-
-
0038011251
-
The Verification of an Industrial Payment Protocol: The SET Purchase Phase
-
ACM, New York
-
Bella, G., Paulson, L.C., Massacci, F.: The Verification of an Industrial Payment Protocol: the SET Purchase Phase. In: CCS 2002: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 12-20. ACM, New York (2002)
-
(2002)
CCS 2002: Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 12-20
-
-
Bella, G.1
Paulson, L.C.2
Massacci, F.3
-
14
-
-
84872906800
-
-
TCG Software Stack TSS
-
TCG Software Stack (TSS) Specifications, https://www. trustedcomputinggroup.org/specs/TSS/
-
Specifications
-
-
-
17
-
-
70349248601
-
Behavioral Attestation forWeb Services (BA4WS)
-
ACM Press, New York
-
Alam, M., Zhang, X., Nauman, M., Ali, T.: Behavioral Attestation forWeb Services (BA4WS). In: SWS 2008: Proceedings of the ACM Workshop on Secure Web Services (SWS) located at 15th ACM Conference on Computer and Communications Security (CCS-15). ACM Press, New York (2008)
-
(2008)
SWS 2008: Proceedings of the ACM Workshop on Secure Web Services (SWS) located at 15th ACM Conference on Computer and Communications Security (CCS-15)
-
-
Alam, M.1
Zhang, X.2
Nauman, M.3
Ali, T.4
-
18
-
-
11944266314
-
Verifying Information Flow Goals in Security-Enhanced Linux
-
Guttman, J.: Verifying Information Flow Goals in Security-Enhanced Linux. Journal of Computer Security 13(1), 115-134 (2005)
-
(2005)
Journal of Computer Security
, vol.13
, Issue.1
, pp. 115-134
-
-
Guttman, J.1
-
19
-
-
0017517624
-
Certification of programs for secure information flow
-
Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Commun. ACM 20(7), 504-513 (1977)
-
(1977)
Commun. ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
21
-
-
38049058764
-
-
Dynamic Information-flow for Virtual Machines
-
Haldar, V., Chandra, D., Franz, M.: Practical, Dynamic Information-flow for Virtual Machines, www.vivekhaldar.com/pubs/plid2005.pdf
-
Practical
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
22
-
-
39149090024
-
A Virtual Machine Based Information Flow Control System for Policy Enforcement
-
Nair, S., Simpson, P., Crispo, B., Tanenbaum, A.: A Virtual Machine Based Information Flow Control System for Policy Enforcement. Electronic Notes in Theoretical Computer Science 197(1), 3-16 (2008)
-
(2008)
Electronic Notes in Theoretical Computer Science
, vol.197
, Issue.1
, pp. 3-16
-
-
Nair, S.1
Simpson, P.2
Crispo, B.3
Tanenbaum, A.4
-
23
-
-
70349239516
-
Improving Coherency of Runtime Integrity Measurement
-
ACM, New York
-
Thober, M., Pendergrass, J.A., McDonell, C.D.: Improving Coherency of Runtime Integrity Measurement. In: STC 2008: Proceedings of the 2008 ACM Workshop on Scalable Trusted Computing. ACM, New York (2008)
-
(2008)
STC 2008: Proceedings of the 2008 ACM Workshop on Scalable Trusted Computing
-
-
Thober, M.1
Pendergrass, J.A.2
McDonell, C.D.3
-
24
-
-
70349234685
-
Remote Attestation on Program Execution
-
ACM, New York
-
Gu, L., Ding, X., Deng, R., Xie, B., Mei, H.: Remote Attestation on Program Execution. In: STC 2008: Proceedings of the 2008 ACM Workshop on Scalable Trusted Computing. ACM, New York (2008)
-
(2008)
STC 2008: Proceedings of the 2008 ACM Workshop on Scalable Trusted Computing
-
-
Gu, L.1
Ding, X.2
Deng, R.3
Xie, B.4
Mei, H.5
-
25
-
-
70349659108
-
-
Haldar, V., Chandra, D., Franz, M.: Semantic Remote Attestation - A Virtual Machine directed approach to Trusted Computing In. Proc. of the Third Virtual Macine Research and Technology Symposium USENIX (2004)
-
Haldar, V., Chandra, D., Franz, M.: Semantic Remote Attestation - A Virtual Machine directed approach to Trusted Computing In. Proc. of the Third Virtual Macine Research and Technology Symposium USENIX (2004)
-
-
-
|