-
1
-
-
77954703961
-
MoTrust-TCG: Manipulationsschutz für mobile Signaturanwendungen mittels Trusted Computing
-
Alkassar, A., Gnaida, U., Quirin, T.: MoTrust-TCG: Manipulationsschutz für mobile Signaturanwendungen mittels Trusted Computing. In: Sicherheit 2008, pp. 575-580 (2008)
-
(2008)
Sicherheit 2008
, pp. 575-580
-
-
Alkassar, A.1
Gnaida, U.2
Quirin, T.3
-
2
-
-
77954751433
-
Data Leakage Prevention in Trusted Virtual Domains
-
Pohlmann, N., Reimer, H., Schneider, W. (eds.) Vieweg + Teubner Verlag
-
Alkassar, A., Husseiki, R.: Data Leakage Prevention in Trusted Virtual Domains. In: Pohlmann, N., Reimer, H., Schneider, W. (eds.) Information Security Solutions Europe (ISSE 2009). Vieweg + Teubner Verlag (2009)
-
(2009)
Information Security Solutions Europe (ISSE 2009)
-
-
Alkassar, A.1
Husseiki, R.2
-
3
-
-
84883020601
-
Security architecture for device encryption and VPN
-
Vieweg Verlag
-
Alkassar, A., Scheibel, M., Sadeghi, A.-R., Stuble, C., Winandy, M.: Security architecture for device encryption and VPN. In: Information Security Solution Europe (ISSE 2006). Vieweg Verlag (2006)
-
(2006)
Information Security Solution Europe (ISSE 2006)
-
-
Alkassar, A.1
Scheibel, M.2
Sadeghi, A.-R.3
Stuble, C.4
Winandy, M.5
-
5
-
-
70349245595
-
An Efficient Implementation of Trusted Channels based on OpenSSL
-
Armknecht, F., Gasmi, Y., Sadeghi, A.-R., Ramunno, G., Vernizzi, D., Stewin, P., Unger, M.: An Efficient Implementation of Trusted Channels based on OpenSSL. In: Proceedings of ACM STC 2008 (2008)
-
(2008)
Proceedings of ACM STC 2008
-
-
Armknecht, F.1
Gasmi, Y.2
Sadeghi, A.-R.3
Ramunno, G.4
Vernizzi, D.5
Stewin, P.6
Unger, M.7
-
7
-
-
0021122553
-
Software Errors And Complexity: An Empirical Investigation
-
DOI 10.1145/69605.2085
-
Basili, V., Perricone, B.: Software Errors and Complexity: An Empirical Investigation. Communications of the ACM, 42-52 (1984) (Pubitemid 14550485)
-
(1984)
Communications of the ACM
, vol.27
, Issue.1
, pp. 42-52
-
-
Basili Victor, R.1
Perricone Barry, T.2
-
8
-
-
77954695078
-
-
Technical report, Sysgo September
-
Brygier, J., Fuchsen, R., Blasum, H.: PikeOS: Safe and Secure Virtualization in a Separation Microkernel. Technical report, Sysgo (September 2009)
-
(2009)
PikeOS: Safe and Secure Virtualization in a Separation Microkernel
-
-
Brygier, J.1
Fuchsen, R.2
Blasum, H.3
-
10
-
-
70350686777
-
Implementation Aspects of Mobile and Embedded Trusted Computing
-
Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. Springer, Heidelberg
-
Diedrich, K., Winter, J.: Implementation Aspects of Mobile and Embedded Trusted Computing. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol. 5471, pp. 29-44. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5471
, pp. 29-44
-
-
Diedrich, K.1
Winter, J.2
-
12
-
-
77954709378
-
A bibliography of windowing systems and security
-
Epstein, J.: A bibliography of windowing systems and security. ACM SIGSAC Review 10(4), 7-11 (1992)
-
(1992)
ACM SIGSAC Review
, vol.10
, Issue.4
, pp. 7-11
-
-
Epstein, J.1
-
13
-
-
84974757646
-
A high assurance window system prototype
-
Epstein, J., McHugh, J., Orman, H., Pascale, R., Marmor-Squires, A., Danner, B., Martin, C.R., Branstad, M., Benson, G., Rothnie, D.: A high assurance window system prototype. Journal of Computer Security 2(2), 159-190 (1993)
-
(1993)
Journal of Computer Security
, vol.2
, Issue.2
, pp. 159-190
-
-
Epstein, J.1
McHugh, J.2
Orman, H.3
Pascale, R.4
Marmor-Squires, A.5
Danner, B.6
Martin, C.R.7
Branstad, M.8
Benson, G.9
Rothnie, D.10
-
17
-
-
77952256837
-
Towards trustworthy computing systems: Taking microkernels to the next level
-
Heiser, G., Elphinstone, K., Kuz, I., Klein, G., Petters, S.M.: Towards trustworthy computing systems: taking microkernels to the next level. ACM Operating Systems Review 4, 3-11 (2007)
-
(2007)
ACM Operating Systems Review
, vol.4
, pp. 3-11
-
-
Heiser, G.1
Elphinstone, K.2
Kuz, I.3
Klein, G.4
Petters, S.M.5
-
19
-
-
70450250883
-
-
Mobile Phone Working Group Technical Report version 1.0, Trusted Computing Group June
-
Mobile Phone Working Group. TCG Mobile Trusted Module Specification. Technical Report version 1.0, Trusted Computing Group (June 2008)
-
(2008)
TCG Mobile Trusted Module Specification
-
-
-
20
-
-
0013347999
-
-
Technical Report RZ 3335 (#93381), IBM Research Division, Zurich Laboratory April
-
Pfitzmann, B., Riordan, J., Stüble, C., Waidner, M., Weber, A.: The PERSEUS system architecture. Technical Report RZ 3335 (#93381), IBM Research Division, Zurich Laboratory (April 2001)
-
(2001)
The PERSEUS System Architecture
-
-
Pfitzmann, B.1
Riordan, J.2
Stüble, C.3
Waidner, M.4
Weber, A.5
-
21
-
-
27244444707
-
European multilateral secure computing base - Open trusted computing for you and me
-
Datenschutz und Datensicherheit DuD, Verlag Friedrich Vieweg & Sohn
-
Sadeghi, A.-R., Stüble, C., Pohlmann, N.: European multilateral secure computing base - open trusted computing for you and me. Datenschutz und Datensicherheit DuD, Verlag Friedrich Vieweg & Sohn, Wiesbaden 28(9), 548-554 (2004)
-
(2004)
Wiesbaden
, vol.28
, Issue.9
, pp. 548-554
-
-
Sadeghi, A.-R.1
Stüble, C.2
Pohlmann, N.3
-
23
-
-
85084163031
-
Design of the EROS trusted window system
-
USENIX
-
Shapiro, J.S., Vanderburgh, J., Northup, E.: Design of the EROS trusted window system. In: Proceedings of the 13th USENIX Security Symposium, August 2004, USENIX (2004)
-
(2004)
Proceedings of the 13th USENIX Security Symposium, August 2004
-
-
Shapiro, J.S.1
Vanderburgh, J.2
Northup, E.3
-
24
-
-
77954737753
-
μTSS - A Simplied Trusted Software Stack
-
Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. Springer, Heidelberg
-
Stüble, C., Zaerin, A.: μTSS - A Simplied Trusted Software Stack. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 124-140. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6101
, pp. 124-140
-
-
Stüble, C.1
Zaerin, A.2
-
25
-
-
79960321560
-
TPM main specification
-
Trusted Computing Group. Version 1.2 rev. 85, Trusted Computing Group February
-
Trusted Computing Group. TPM main specification. Main Specification Version 1.2 rev. 85, Trusted Computing Group (February 2005)
-
(2005)
Main Specification
-
-
|