-
2
-
-
56649113222
-
-
Trusted Computing Group:, Version 1.2 rev, July 2007
-
Trusted Computing Group: TPM Main Specification Version 1.2 rev. 103 (July 2007), https://www.trustedcomputinggroup.org
-
Specification
, pp. 103
-
-
Main, T.P.M.1
-
3
-
-
0033293553
-
Building a high-performance, programmable secure coprocessor
-
Smith, S.W., Weingart, S.: Building a high-performance, programmable secure coprocessor. Computer Networks 31(8), 831-860 (1999)
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 831-860
-
-
Smith, S.W.1
Weingart, S.2
-
4
-
-
70350692134
-
-
Yee, B.S.: Using Secure Coprocessors. PhD thesis, School of Computer Science, Carnegie Mellon University, CMU-CS-94-149 (May 1994)
-
Yee, B.S.: Using Secure Coprocessors. PhD thesis, School of Computer Science, Carnegie Mellon University, CMU-CS-94-149 (May 1994)
-
-
-
-
5
-
-
70350683577
-
-
Kurth, H., Krummeck, G., Stüble, C., Weber, M., Winandy, M.: HASK-PP: Protection profile for a high assurance security kernel (2008), http://www.sirrix.com/media/downloads/54500.pdf
-
(2008)
HASK-PP: Protection profile for a high assurance security kernel
-
-
Kurth, H.1
Krummeck, G.2
Stüble, C.3
Weber, M.4
Winandy, M.5
-
6
-
-
70350700721
-
-
European Multilaterally Secure Computing Base
-
European Multilaterally Secure Computing Base, http://www.emscb.de
-
-
-
-
9
-
-
27244444707
-
European multilateral secure computing base - open trusted computing for you and me
-
Sadeghi, A.R., Stüble, C., Pohlmann, N.: European multilateral secure computing base - open trusted computing for you and me. Datenschutz und Datensicherheit DuD 28(9), 548-554 (2004)
-
(2004)
Datenschutz und Datensicherheit DuD
, vol.28
, Issue.9
, pp. 548-554
-
-
Sadeghi, A.R.1
Stüble, C.2
Pohlmann, N.3
-
11
-
-
0016726281
-
Structured specification of a security kernel
-
ACM, New York
-
Walter, K.G., Schaen, S.I., Ogden, W.F., Rounds, W.C., Shumway, D.G., Schaeffer, D.D., Biba, K.J., Bradshaw, F.T., Ames, S.R., Gilligan, J.M.: Structured specification of a security kernel. In: Proceedings of the international conference on Reliable software, pp. 285-293. ACM, New York (1975)
-
(1975)
Proceedings of the international conference on Reliable software
, pp. 285-293
-
-
Walter, K.G.1
Schaen, S.I.2
Ogden, W.F.3
Rounds, W.C.4
Shumway, D.G.5
Schaeffer, D.D.6
Biba, K.J.7
Bradshaw, F.T.8
Ames, S.R.9
Gilligan, J.M.10
-
13
-
-
0020777709
-
Security kernel design and implementation: An introduction
-
Ames Jr., S.R., Gasser, M., Schell, R.R.: Security kernel design and implementation: An introduction. Computer 16(7), 14-22 (1983)
-
(1983)
Computer
, vol.16
, Issue.7
, pp. 14-22
-
-
Ames Jr., S.R.1
Gasser, M.2
Schell, R.R.3
-
14
-
-
0026254933
-
A retrospective on the VAX VMM security kernel
-
Karger, P.A., Zurko, M.E., Bonin, D.W., Mason, A.H., Kahn, C.E.: A retrospective on the VAX VMM security kernel. IEEE Transactions on Software Engineering 17(11), 1147-1163 (1991)
-
(1991)
IEEE Transactions on Software Engineering
, vol.17
, Issue.11
, pp. 1147-1163
-
-
Karger, P.A.1
Zurko, M.E.2
Bonin, D.W.3
Mason, A.H.4
Kahn, C.E.5
-
16
-
-
0016951438
-
Security kernel validation in practice
-
Millen, J.K.: Security kernel validation in practice. Commun. ACM 19(5), 243-250 (1976)
-
(1976)
Commun. ACM
, vol.19
, Issue.5
, pp. 243-250
-
-
Millen, J.K.1
-
19
-
-
70350668643
-
-
DeLong, R.J.: LynxSecure separation kernel - a high-assurance security RTOS. Technical report, LynuxWorks, San Jose, CA (May 2007)
-
DeLong, R.J.: LynxSecure separation kernel - a high-assurance security RTOS. Technical report, LynuxWorks, San Jose, CA (May 2007)
-
-
-
-
20
-
-
70350697616
-
-
Green Hills Software Inc, INTEGRITY PC Technology November
-
Green Hills Software Inc.: INTEGRITY PC Technology (November 2008), http://www.ghs.com/products/rtos/integritypc.html
-
(2008)
-
-
-
21
-
-
0003487975
-
-
Wind River Systems Inc, Wind River High-Assurance Solutions for Aerospace & Defense, February 2008
-
Wind River Systems Inc.: Wind River High-Assurance Solutions for Aerospace & Defense. Whitepaper (February 2008), http://www.windriver.com/ products/product-verviews/PO-MILS-Solution-Feb2008.pdf
-
Whitepaper
-
-
-
22
-
-
0036684901
-
Creating high confidence in a separation kernel
-
Martin, W.B., White, P.D., Taylor, F.S.: Creating high confidence in a separation kernel. Automated Software Engineering. 9(3), 263-284 (2002)
-
(2002)
Automated Software Engineering
, vol.9
, Issue.3
, pp. 263-284
-
-
Martin, W.B.1
White, P.D.2
Taylor, F.S.3
-
23
-
-
34547321335
-
Formal specification and verification of data separation in a separation kernel for an embedded system
-
ACM, New York
-
Heitmeyer, C.L., Archer, M., Leonard, E.I., McLean, J.: Formal specification and verification of data separation in a separation kernel for an embedded system. In: CCS 2006: Proceedings of the 13th ACM conference on Computer and communications security, pp. 346-355. ACM, New York (2006)
-
(2006)
CCS 2006: Proceedings of the 13th ACM conference on Computer and communications security
, pp. 346-355
-
-
Heitmeyer, C.L.1
Archer, M.2
Leonard, E.I.3
McLean, J.4
-
24
-
-
70350674180
-
-
Information Assurance Directorate: U.S. government protection profile for separation kernels in environments requiring high robustness (SKPP) (2007), http://www.niap-ccevs.org/cc-scheme/pp/pp.cfm/id/pp-skpp-hr-v1.03
-
Information Assurance Directorate: U.S. government protection profile for separation kernels in environments requiring high robustness (SKPP) (2007), http://www.niap-ccevs.org/cc-scheme/pp/pp.cfm/id/pp-skpp-hr-v1.03
-
-
-
-
26
-
-
48649094671
-
Toward a medium-robustness separation kernel protection profile
-
IEEE Computer Society Press, Los Alamitos
-
DeLong, R.J., Nguyen, T., Irvine, C., Levin, T.: Toward a medium-robustness separation kernel protection profile. In: ACSAC 2007. IEEE Computer Society Press, Los Alamitos (2007)
-
(2007)
ACSAC
-
-
DeLong, R.J.1
Nguyen, T.2
Irvine, C.3
Levin, T.4
-
27
-
-
79959537786
-
Analysis of three multilevel security architectures
-
ACM, New York
-
Levin, T.E., Irvine, C.E., Weissman, C., Nguyen, T.D.: Analysis of three multilevel security architectures. In: CSAW 2007: Proceedings of the 2007 ACM workshop on Computer security architecture, pp. 37-46. ACM, New York (2007)
-
(2007)
CSAW 2007: Proceedings of the 2007 ACM workshop on Computer security architecture
, pp. 37-46
-
-
Levin, T.E.1
Irvine, C.E.2
Weissman, C.3
Nguyen, T.D.4
-
28
-
-
70350668642
-
-
National Security Agency
-
National Security Agency: Controlled access protection profile (CAPP) (1999), http://www.niap-ccevs.org/cc-scheme/pp/id/PP-OS-CA-V1.d
-
(1999)
Controlled access protection profile (CAPP)
-
-
-
29
-
-
70350692133
-
-
National Security Agency
-
National Security Agency: Labeled security protection profile (LSPP) (1999), http://www.niap-ccevs.org/cc-scheme/pp/id/PP-OS-LS-V1.b
-
(1999)
Labeled security protection profile (LSPP)
-
-
-
31
-
-
0030672130
-
A secure and reliable bootstrap architecture
-
Oakland, CA, pp, IEEE Computer Society Press, Los Alamitos
-
Arbaugh, W.A., Farber, D.J., Smith, J.M.: A secure and reliable bootstrap architecture. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, pp. 65-71. IEEE Computer Society Press, Los Alamitos (1997)
-
(1997)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 65-71
-
-
Arbaugh, W.A.1
Farber, D.J.2
Smith, J.M.3
-
32
-
-
85073202707
-
Automated recovery in a secure bootstrap process
-
San Diego, California, pp
-
Arbaugh, W.A., Keromytis, A.D., Farber, D.J., Smith, J.M.: Automated recovery in a secure bootstrap process. In: Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 1998), San Diego, California, pp. 155-167 (2008)
-
(1998)
Proceedings of the Symposium on Network and Distributed Systems Security (NDSS
, pp. 155-167
-
-
Arbaugh, W.A.1
Keromytis, A.D.2
Farber, D.J.3
Smith, J.M.4
-
33
-
-
34547205548
-
Linking remote attestation to secure tunnel endpoints
-
ACM, New York
-
Goldman, K., Perez, R., Sailer, R.: Linking remote attestation to secure tunnel endpoints. In: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing (STC 2006), pp. 21-24. ACM, New York (2006)
-
(2006)
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing (STC
, pp. 21-24
-
-
Goldman, K.1
Perez, R.2
Sailer, R.3
-
34
-
-
79953218276
-
A robust integrity reporting protocol for remote attestation
-
Fall
-
Stumpf, F., Tafreschi, O., Röder, P., Eckert, C.: A robust integrity reporting protocol for remote attestation. In: Proceedings of the Second Workshop on Advances in Trusted Computing (WATC 2006) (Fall 2006)
-
(2006)
Proceedings of the Second Workshop on Advances in Trusted Computing (WATC
-
-
Stumpf, F.1
Tafreschi, O.2
Röder, P.3
Eckert, C.4
-
35
-
-
38149014725
-
-
Sadeghi, A.R., Wolf, M., Stüble, C., Asokan, N., Ekberg, J.E.: Enabling fairer digital rights management with trusted computing. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, 4779, pp. 53-70. Springer, Heidelberg (2007)
-
Sadeghi, A.R., Wolf, M., Stüble, C., Asokan, N., Ekberg, J.E.: Enabling fairer digital rights management with trusted computing. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 53-70. Springer, Heidelberg (2007)
-
-
-
-
36
-
-
79952612270
-
Beyond secure channels
-
ACM, New York
-
Gasmi, Y., Sadeghi, A.-R., Stewin, P., Unger, M., Asokan, N.: Beyond secure channels. In: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing (STC 2007), pp. 30-40. ACM, New York (2007)
-
(2007)
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing (STC
, pp. 30-40
-
-
Gasmi, Y.1
Sadeghi, A.-R.2
Stewin, P.3
Unger, M.4
Asokan, N.5
-
37
-
-
70349245595
-
An efficient implementation of trusted channels based on OpenSSL
-
ACM, New York
-
Armknecht, F., Gasmi, Y., Sadeghi, A.R., Stewin, P., Unger, M., Ramunno, G., Vernizzi, D.: An efficient implementation of trusted channels based on OpenSSL. In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing (STC 2008), pp. 41-50. ACM, New York (2008)
-
(2008)
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing (STC
, pp. 41-50
-
-
Armknecht, F.1
Gasmi, Y.2
Sadeghi, A.R.3
Stewin, P.4
Unger, M.5
Ramunno, G.6
Vernizzi, D.7
|