메뉴 건너뛰기




Volumn , Issue , 2009, Pages 254-265

TrustGraph: Trusted graphics subsystem for high assurance systems

Author keywords

Covert channel analysis; Formal verification; Multi level security; Trusted graphics; Virtualization

Indexed keywords

COVERT CHANNELS; CRITICAL COMPONENT; DEGREE OF SEPARATION; FORMAL VERIFICATIONS; GRAPHICS SUBSYSTEM; HIGH ASSURANCE; HIGH ASSURANCE SYSTEMS; I/O DEVICE; MULTI-LEVEL SECURITY; SECURITY MECHANISM; SECURITY POLICY; SECURITY PRINCIPLES; SIMPLE OPERATION; THREATS AND ATTACKS; VIRTUALIZATIONS;

EID: 77950834189     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2009.31     Document Type: Conference Paper
Times cited : (6)

References (42)
  • 1
    • 77950813341 scopus 로고    scopus 로고
    • Directfb. http://www.directfb.org/.
  • 4
    • 77950854727 scopus 로고    scopus 로고
    • Amd i/o virtualization technology (iommu) specification
    • publication no. 34434
    • Amd i/o virtualization technology (iommu) specification. Advanced Micro Devices, 2006. publication no. 34434.
    • (2006) Advanced Micro Devices
  • 5
    • 77950796073 scopus 로고    scopus 로고
    • Common criteria security assurance requirements
    • CCPART3V3
    • Common criteria security assurance requirements. Common Criteria Recognition Arrangement, 2007. CCPART3V3.
    • (2007) Common Criteria Recognition Arrangement
  • 10
    • 0024874249 scopus 로고
    • Multiple operating systems on one processor complex
    • T. L. Borden, J. P. Hennessy, and J. W. Rymarczyk. Multiple operating systems on one processor complex. IBM Syst. J., 28(1):104-123, 1989.
    • (1989) IBM Syst. J. , vol.28 , Issue.1 , pp. 104-123
    • Borden, T.L.1    Hennessy, J.P.2    Rymarczyk, J.W.3
  • 12
    • 39049160207 scopus 로고    scopus 로고
    • Fifteen years after tx: A look back at high assurance multi-level secure windowing
    • Washington, DC, USA, IEEE Computer Society
    • J. Epstein. Fifteen years after tx: A look back at high assurance multi-level secure windowing. In ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference, pages 301-320, Washington, DC, USA, 2006. IEEE Computer Society.
    • (2006) ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference , pp. 301-320
    • Epstein, J.1
  • 20
    • 54049158161 scopus 로고    scopus 로고
    • I/o for virtual machine monitors: Security and performance issues
    • Paul A. Karger and David R. Safford. I/o for virtual machine monitors: Security and performance issues. IEEE Security and Privacy, 6(5):16-23, 2008.
    • (2008) IEEE Security and Privacy , vol.6 , Issue.5 , pp. 16-23
    • Karger, P.A.1    Safford, D.R.2
  • 22
    • 0005052707 scopus 로고
    • The boyer-moore theorem prover and its interactive enhancement
    • M. Kaufmann and R. S. Boyer. The boyer-moore theorem prover and its interactive enhancement. Computers and Mathematics with Applications, 29(2):27-62, 1995.
    • (1995) Computers and Mathematics with Applications , vol.29 , Issue.2 , pp. 27-62
    • Kaufmann, M.1    Boyer, R.S.2
  • 23
    • 77952966852 scopus 로고    scopus 로고
    • volume Version 3.4. University of Texas at Austin, August
    • M. Kaufmann and J. S. Moore. ACL2, volume Version 3.4. University of Texas at Austin, August 2008.
    • (2008) ACL2
    • Kaufmann, M.1    Moore, J.S.2
  • 27
    • 0031599142 scopus 로고    scopus 로고
    • Mersenne twister: A 623-dimensionally equidistributed uniform pseudo-random number generator
    • M. Matsumoto and T. Nishimura. Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Transactions on Modeling and Computer Simulation, 8(3), 1998.
    • (1998) ACM Transactions on Modeling and Computer Simulation , vol.8 , Issue.3
    • Matsumoto, M.1    Nishimura, T.2
  • 28
    • 33751069196 scopus 로고    scopus 로고
    • Nettop: Commercial technology in high assurance applications
    • Fall
    • R. Meushaw and D. Simard. Nettop: Commercial technology in high assurance applications. National Security Agency Tech Trend Notes, 9(4):3-10, Fall 2000.
    • (2000) National Security Agency Tech Trend Notes , vol.9 , Issue.4 , pp. 3-10
    • Meushaw, R.1    Simard, D.2
  • 34
    • 0022705379 scopus 로고
    • The x window system
    • April
    • Robert W. Scheifler and Jim Gettys. The x window system. ACM Trans. Graph., 5(2):79-109, April 1986.
    • (1986) ACM Trans. Graph. , vol.5 , Issue.2 , pp. 79-109
    • Scheifler, R.W.1    Gettys, J.2
  • 39
    • 0018983212 scopus 로고
    • Specification and verification of the ucla unix security kernel
    • February
    • Bruce J. Walker, Richard A. Kemmerer, and Gerald J. Popek. Specification and verification of the ucla unix security kernel. Commun. ACM, 23(2):118-131, February 1980.
    • (1980) Commun. ACM , vol.23 , Issue.2 , pp. 118-131
    • Walker, B.J.1    Kemmerer, R.A.2    Popek, G.J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.