-
1
-
-
71749091314
-
-
Aufs - Another Unionfs, http://aufs.sourceforge.net/.
-
-
-
-
2
-
-
71749104989
-
-
dm-crypt: A device-mapper crypto target
-
dm-crypt: A device-mapper crypto target, http://www.saout.de/misc/dm- crypt/.
-
-
-
-
3
-
-
71749105183
-
-
TrustedGRUB
-
TrustedGRUB, http://sourceforge.net/projects/trustedgrub.
-
-
-
-
4
-
-
71749100952
-
-
Unionfs: A stackable unification file system
-
Unionfs: A stackable unification file system, http://www.am-utils.org/ project-unionfs.html.
-
-
-
-
5
-
-
70349245595
-
An efficient implementation of Trusted Channels based on Openssl
-
ACM Press, New York, NY, USA
-
F. Armknecht, Y. Gasmi, A.-R. Sadeghi, P. Stewin, M. Unger, G. Ramunno and D. Vernizzi, An efficient implementation of Trusted Channels based on Openssl, in: STC'08: Proceedings of the 3rd ACMWorkshop on Scalable Trusted Computing, ACM Press, New York, NY, USA, 2008, pp. 41-50.
-
(2008)
STC'08: Proceedings of the 3rd ACMWorkshop on Scalable Trusted Computing
, pp. 41-50
-
-
Armknecht, F.1
Gasmi, Y.2
Sadeghi, A.-R.3
Stewin, P.4
Unger, M.5
Ramunno, G.6
Vernizzi, D.7
-
6
-
-
21644433634
-
Xen and the art of virtualization
-
ACM Press, New York, NY, USA, October
-
P.T. Barham, B. Dragovic, K. Fraser, S. Hand, T.L. Harris, A. Ho, R. Neugebauer, I. Pratt and A. Warfield, Xen and the art of virtualization, in: Proc. 19th ACM Symposium on Operating Systems Principles (SOSP-2003), ACM Press, New York, NY, USA, October 2003, pp. 164-177.
-
(2003)
Proc. 19th ACM Symposium on Operating Systems Principles (SOSP-2003)
, pp. 164-177
-
-
Barham, P.T.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.L.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
7
-
-
54049153566
-
TVDc: Managing security in the trusted virtual datacenter
-
S. Berger, R. Cáceres, D. Pendarakis, R. Sailer, E. Valdez, R. Perez, W. Schildhauer and D. Srinivasan, TVDc: Managing security in the trusted virtual datacenter, SIGOPS Operating Systems Review 42(1) (2008), 40-47.
-
(2008)
SIGOPS Operating Systems Review
, vol.42
, Issue.1
, pp. 40-47
-
-
Berger, S.1
Cáceres, R.2
Pendarakis, D.3
Sailer, R.4
Valdez, E.5
Perez, R.6
Schildhauer, W.7
Srinivasan, D.8
-
8
-
-
70350642949
-
-
Research Report RC 23792, IBM Research, November
-
A. Bussani, J.L. Griffin, B. Jansen, K. Julisch, G. Karjoth, H. Maruyama, M. Nakamura, R. Perez, M. Schunter, A. Tanner, L. van Doorn, E.V. Herreweghen, M. Waidner and S. Yoshihama, Trusted Virtual Domains: Secure foundation for business and IT services, Research Report RC 23792, IBM Research, November 2005.
-
(2005)
Trusted Virtual Domains: Secure Foundation for Business and IT Services
-
-
Bussani, A.1
Griffin, J.L.2
Jansen, B.3
Julisch, K.4
Karjoth, G.5
Maruyama, H.6
Nakamura, M.7
Perez, R.8
Schunter, M.9
Tanner, A.10
Van Doorn, L.11
Herreweghen, E.V.12
Waidner, M.13
Yoshihama, S.14
-
9
-
-
84884990589
-
Algebraic models to detect and solve policy conflicts
-
I. Kotenko, V. Gorodetsky and V.A. Skormin, eds, CCIS, Springer
-
A. Cappadonia, C. Basile and A. Lioy, Algebraic models to detect and solve policy conflicts, in: MMM-ACNS 2007, I. Kotenko, V. Gorodetsky and V.A. Skormin, eds, CCIS, vol.1, Springer, 2007, pp. 242-247.
-
MMM-ACNS 2007
, vol.1
, Issue.2007
, pp. 242-247
-
-
Cappadonia, A.1
Basile, C.2
Lioy, A.3
-
10
-
-
70350673437
-
Towards automated provisioning of secure virtualized networks
-
ACM Press, New York, NY, USA, October
-
S. Cabuk, C. Dalton, H.V. Ramasamy and M. Schunter, Towards automated provisioning of secure virtualized networks, in: Proc. 14th ACM Conference on Computer and Communications Security (CCS-2007), ACM Press, New York, NY, USA, October 2007, pp. 235-245.
-
(2007)
Proc. 14th ACM Conference on Computer and Communications Security (CCS-2007)
, pp. 235-245
-
-
Cabuk, S.1
Dalton, C.2
Ramasamy, H.V.3
Schunter, M.4
-
11
-
-
27544456041
-
Towards constant bandwidth overhead integrity checking of untrusted data
-
IEEE Computer Society
-
D.E. Clarke, G.E. Suh, B. Gassend, A. Sudan, M. van Dijk and S. Devadas, Towards constant bandwidth overhead integrity checking of untrusted data, in: IEEE Symposium on Security and Privacy, IEEE Computer Society, 2005, pp. 139-153.
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 139-153
-
-
Clarke, D.E.1
Suh, G.E.2
Gassend, B.3
Sudan, A.4
Van Dijk, M.5
Devadas, S.6
-
12
-
-
33847753565
-
-
version 1.1. Internet engineering task force:txt, Network Working Group RFC 4346, April 2006
-
T. Dierks and E. Rescorla, The Transport Layer Security (TLS) protocol version 1.1. Internet engineering task force: http://www.ietf.org/rfc/rfc4346. txt, Network Working Group RFC 4346, April 2006.
-
The Transport Layer Security (TLS) Protocol
-
-
Dierks, T.1
Rescorla, E.2
-
13
-
-
71749117200
-
A formal specification of conflicts in dynamic policybased management systems
-
University of Queensland, Australia, August
-
N. Dunlop, J. Indulska and K.A. Raymond, A formal specification of conflicts in dynamic policybased management systems, DSTC Technical report, CRC for Enterprise Distributed Systems, University of Queensland, Australia, August 2001.
-
(2001)
DSTC Technical Report, CRC for Enterprise Distributed Systems
-
-
Dunlop, N.1
Indulska, J.2
Raymond, K.A.3
-
14
-
-
27644451689
-
Conflict classification and analysis of distributed firewall policies
-
H. Hamed, E. Al-Shaer, R. Boutaba and M. Hasan, Conflict classification and analysis of distributed firewall policies, IEEE Journal on Selected Areas in Communications 23(10) (2005), 2069-2084.
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.10
, pp. 2069-2084
-
-
Hamed, H.1
Al-Shaer, E.2
Boutaba, R.3
Hasan, M.4
-
15
-
-
84944041936
-
IPSec/VPN security policy: Correctness, conflict detection, and resolution
-
Z. Fu, S.F. Wu, H. Huang, K. Loh, F. Gong, I. Baldine and C. Xu, IPSec/VPN security policy: Correctness, conflict detection, and resolution, in: POLICY, Springer-Verlag, 2001, pp. 39-56.
-
(2001)
POLICY, Springer-Verlag
, pp. 39-56
-
-
Fu, Z.1
Wu, S.F.2
Huang, H.3
Loh, K.4
Gong, F.5
Baldine, I.6
Xu, C.7
-
16
-
-
79952612270
-
Beyond secure channels
-
ACM Press
-
Y. Gasmi, A.-R. Sadeghi, P. Stewin, M. Unger and N. Asokan, Beyond secure channels, in: STC '07: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, ACM Press, 2007, pp. 30-40.
-
(2007)
STC '07: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing
, pp. 30-40
-
-
Gasmi, Y.1
Sadeghi, A.-R.2
Stewin, P.3
Unger, M.4
Asokan, N.5
-
17
-
-
34250717227
-
Toward secure distributed services
-
Yokohama, Japan, June 2005 IEEE Press
-
J. Griffin, T. Jaeger, R. Perez, R. Sailer, L. Van Doorn and R. Caceres, Trusted Virtual Domains: Toward secure distributed services, in: Proc. 1st Workshop on Hot Topics in System Dependability (Hotdep-2005), Yokohama, Japan, June 2005, IEEE Press, 2005.
-
(2005)
Proc. 1st Workshop on Hot Topics in System Dependability (Hotdep-2005)
-
-
Griffin, J.1
Jaeger, T.2
Perez, R.3
Sailer, R.4
Van Doorn, L.5
Caceres, R.6
Virtual Domains, T.7
-
18
-
-
70349659108
-
Semantic Remote Attestation - Virtual machine directed approach to Trusted Computing
-
Also Technical Report No. 03-20, School of Information and Computer Science, University of California, Irvine
-
V. Haldar, D. Chandra and M. Franz, Semantic Remote Attestation - virtual machine directed approach to Trusted Computing, in: USENIX Virtual Machine Research and Technology Symposium, 2004, pp. 29-41. Also Technical Report No. 03-20, School of Information and Computer Science, University of California, Irvine.
-
USENIX Virtual Machine Research and Technology Symposium 2004
, pp. 29-41
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
19
-
-
71749095435
-
-
IEEE, Standards for local and metropolitan area networks: Virtual bridged local area networks, Technical Report ISBN 0-7381-3662-X, IEEE 1998
-
IEEE, Standards for local and metropolitan area networks: Virtual bridged local area networks, Technical Report ISBN 0-7381-3662-X, IEEE, 1998.
-
-
-
-
20
-
-
71749091921
-
Tunneling Ethernet frames in IP datagrams
-
IETF EtherIP:
-
IETF, EtherIP: Tunneling Ethernet frames in IP datagrams, RFC 3378, 2002.
-
(2002)
RFC
, vol.3378
-
-
-
21
-
-
77952330246
-
Policy enforcement and compliance proofs for Xen virtual machines
-
ACM Press, New York
-
B. Jansen, H. Ramasamy and M. Schunter, Policy enforcement and compliance proofs for Xen virtual machines, in: 4th International ACM SIGPLAN/SIGOPS Conference on Virtual Execution Environments (VEE-2008), ACM Press, New York, 2008, pp. 101-110.
-
(2008)
4th International ACM SIGPLAN/SIGOPS Conference on Virtual Execution Environments (VEE-2008)
, pp. 101-110
-
-
Jansen, B.1
Ramasamy, H.2
Schunter, M.3
-
22
-
-
71749111380
-
Towards multi-layer trusted virtual domains
-
Tokyo, Japan, November
-
Y. Katsuno, M. Kudo, Y. Watanabe, S. Yoshihama, R. Perez, R. Sailer and L. van Doorn, Towards multi-layer trusted virtual domains, in: The 2nd Workshop on Advances in Trusted Computing (WATC'06 Fall), Tokyo, Japan, November 2006; http://www.trl.ibm.com/projects/watc/ program.htm.
-
(2006)
The 2nd Workshop on Advances in Trusted Computing (WATC'06 Fall)
-
-
Katsuno, Y.1
Kudo, M.2
Watanabe, Y.3
Yoshihama, S.4
Perez, R.5
Sailer, R.6
Van Doorn, L.7
-
23
-
-
0003470642
-
-
Network Working Group RFC 4346, Obsoletes: RCF2401, December
-
S. Kent and K. Seo, Security architecture for the Internet Protocol, Internet engineering task force: http://www.ietf.org/rfc/rfc4301.txt, Network Working Group RFC 4346, Obsoletes: RCF2401, December 2005.
-
(2005)
Security Architecture for the Internet Protocol, Internet Engineering Task Force
-
-
Kent, S.1
Seo, K.2
-
24
-
-
79959566693
-
Realizing property-based attestation and sealing with commonly available hard- and software
-
ACM, New York, NY, USA
-
U. Kühn, M. Selhorst and C. Stüble, Realizing property-based attestation and sealing with commonly available hard- and software, in: STC'07: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, ACM, New York, NY, USA, 2007, pp. 50-57.
-
STC'07: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing
, vol.2007
, pp. 50-57
-
-
Kühn, U.1
Selhorst, M.2
Stüble, C.3
-
25
-
-
33746050758
-
A universally unique IDentifier (UUID) URN namespace
-
July
-
P. Leach, M. Mealling and R. Salz, A universally unique IDentifier (UUID) URN namespace, Internet engineering task force, RFC 4122, July 2005.
-
(2005)
Internet Engineering Task Force, RFC
, vol.4122
-
-
Leach, P.1
Mealling, M.2
Salz, R.3
-
26
-
-
0033333334
-
Conflicts in policy-based distributed system management
-
E. Lupu and M. Sloman, Conflicts in policy-based distributed system management, IEEE Transaction on Software Engineering 25(6) (1999), 852-869.
-
(1999)
IEEE Transaction on Software Engineering
, vol.25
, Issue.6
, pp. 852-869
-
-
Lupu, E.1
Sloman, M.2
-
27
-
-
21644481379
-
-
Technical Report TR2003-471, Department of Computer Science, Dartmouth College, Hanover, NH, USA
-
R. MacDonald, S. Smith, J. Marchesini and O. Wild, Bear: An open-source virtual secure coprocessor based on TCPA, Technical Report TR2003-471, Department of Computer Science, Dartmouth College, Hanover, NH, USA, 2003.
-
(2003)
Bear: An Open-source Virtual Secure Coprocessor Based on TCPA
-
-
MacDonald, R.1
Smith, S.2
Marchesini, J.3
Wild, O.4
-
28
-
-
21644470487
-
-
Technical Report TR2003-476, Department of Computer Science, Dartmouth College, Hanover, NH, USA
-
J. Marchesini, S.W. Smith, O. Wild and R. MacDonald, Experimenting with TCPA/TCG hardware, or: How I learned to stop worrying and love the bear, Technical Report TR2003-476, Department of Computer Science, Dartmouth College, Hanover, NH, USA, 2003.
-
(2003)
Experimenting with TCPA/TCG Hardware, Or: How i Learned to Stop Worrying and Love the Bear
-
-
Marchesini, J.1
Smith, S.W.2
Wild, O.3
MacDonald, R.4
-
29
-
-
21644454794
-
Open-source applications of TCPA hardware
-
December 2004, ACM, IEEE Computer Society, Washington, DC, USA
-
J. Marchesini, S.W. Smith, O.Wild, J. Stabiner and A. Barsamian, Open-source applications of TCPA hardware, in: 20th Annual Computer Security Applications Conference, December 2004, ACM, IEEE Computer Society, Washington, DC, USA, 2004, pp. 294-303.
-
(2004)
20th Annual Computer Security Applications Conference
, pp. 294-303
-
-
Marchesini, J.1
Smith, S.W.2
Wild, O.3
Stabiner, J.4
Barsamian, A.5
-
30
-
-
33645400412
-
-
White paper, Microsoft Corporation, October
-
C. Mundie, P. de Vries, P. Haynes and M. Corwine, Trustworthy computing, White paper, Microsoft Corporation, October 2002.
-
(2002)
Trustworthy Computing
-
-
Mundie, C.1
De Vries, P.2
Haynes, P.3
Corwine, M.4
-
31
-
-
77952329878
-
Improving Xen security through disaggregation
-
ACM Press, New York
-
D.G. Murray, G. Milos and S. Hand, Improving Xen security through disaggregation, in: 4th International ACM SIGPLAN/SIGOPS Conference on Virtual Execution Environments (VEE-2008), ACM Press, New York, 2008, pp. 151-160.
-
(2008)
4th International ACM SIGPLAN/SIGOPS Conference on Virtual Execution Environments (VEE-2008)
, pp. 151-160
-
-
Murray, D.G.1
Milos, G.2
Hand, S.3
-
33
-
-
77957830611
-
Space-efficient block storage integrity
-
Internet Society, San Diego, CA, February
-
A. Oprea, M.K. Reiter and K. Yang, Space-efficient block storage integrity, in: Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2005), Internet Society, San Diego, CA, February 2005.
-
(2005)
Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2005)
-
-
Oprea, A.1
Reiter, M.K.2
Yang, K.3
-
34
-
-
24644439462
-
-
Technical Report RZ 3548, IBM Research, May
-
J. Poritz, M. Schunter, E. Van Herreweghen and M. Waidner, Property attestation - scalable and privacy-friendly security assessment of peer computers, Technical Report RZ 3548, IBM Research, May 2004.
-
(2004)
Property Attestation - Scalable and Privacy-friendly Security Assessment of Peer Computers
-
-
Poritz, J.1
Schunter, M.2
Van Herreweghen, E.3
Waidner, M.4
-
35
-
-
0003754695
-
A framework for policy-based admission control
-
January
-
D. Pendarakis, R. Yavatkar and R. Guerin, A framework for policy-based admission control, RFC 2753, January 2000.
-
(2000)
RFC 2753
-
-
Pendarakis, D.1
Yavatkar, R.2
Guerin, R.3
-
36
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
ACM Press, New York, NY, USA
-
A.-R. Sadeghi and C. Stüble, Property-based attestation for computing platforms: Caring about properties, not mechanisms, in: Proc. 2004 Workshop on New Security Paradigms (NSPW-2004), ACM Press, New York, NY, USA, 2005, pp. 67-77.
-
(2005)
Proc. 2004 Workshop on New Security Paradigms (NSPW-2004)
, pp. 67-77
-
-
Sadeghi, A.-R.1
Stüble, C.2
-
37
-
-
71749104306
-
-
October see also [38] and http://www.research.ibm.com/ gsal/tcpa/
-
D. Safford, Clarifying misinformation on TCPA, White paper, IBM Research, http://www.research. ibm.com/gsal/tcpa/tcpa-rebuttal.pdf, October 2002; see also [38] and http://www.research.ibm.com/ gsal/tcpa/.
-
(2002)
Clarifying Misinformation on TCPA White Paper IBM Research
-
-
Safford, D.1
-
38
-
-
21644467580
-
-
October see also [37] and http://www.research.ibm.com/ gsal/tcpa/
-
D. Safford, The need for TCPA, White paper, IBM Research, http://www.research. ibm.com/gsal/tcpa/why-tcpa.pdf, October 2002; see also [37] and http://www.research.ibm.com/ gsal/tcpa/.
-
(2002)
The Need for TCPA White Paper IBM Research
-
-
Safford, D.1
-
39
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
USENIX Association, Berkeley, CA, USA
-
R. Sailer, X. Zhang, T. Jaeger and L. van Doorn, Design and implementation of a TCG-based integrity measurement architecture, in: SSYM'04: Proceedings of the 13th Conference on USENIX Security Symposium, USENIX Association, Berkeley, CA, USA, 2004, pp. 16-16
-
(2004)
SSYM'04: Proceedings of the 13th Conference on USENIX Security Symposium
, pp. 16-16
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
40
-
-
71749113320
-
-
Trusted Computing Group (TCG), www.trustedcomputinggroup.org.
-
-
-
-
41
-
-
71749093810
-
-
version 1.2 revision 103, July see also [43] and http://www. trustedcomputing. org/
-
Trusted Computing Group (TCG), TCG TPM specification version 1.2 revision 103, https://www. trustedcomputinggroup.org/specs/TPM/, July 2007; see also [43] and http://www.trustedcomputing. org/.
-
(2007)
-
-
-
42
-
-
71749110043
-
-
About us May
-
Trusted Computing Group (TCG), About us, https://www. trustedcomputinggroup.org/about/, May 2008.
-
(2008)
-
-
-
43
-
-
71749098625
-
-
version 1.1b February see also [41] and http://www.trustedcomputing. org/
-
Trusted Computing Platform Alliance (TCPA). Main specification version 1.1b, https://www. trustedcomputinggroup. org/specs/TPM/, February 2002; see also [41] and http://www.trustedcomputing. org/.
-
(2002)
-
-
-
44
-
-
0037726388
-
Terminology for policy-based management
-
November
-
A. Westerinen, Terminology for policy-based management, RFC 3198, November 2001.
-
(2001)
RFC
, vol.3198
-
-
Westerinen, A.1
|