-
1
-
-
34250717227
-
Trusted Virtual Domains: Toward secure distributed services
-
Griffin, J.L., Jaeger, T., Perez, R., Sailer, R., van Doorn, L., Cáceres, R.: Trusted Virtual Domains: Toward secure distributed services. In: Proceedings of the 1st IEEE Workshop on Hot Topics in System Dependability, HotDep 2005 (2005)
-
Proceedings of the 1st IEEE Workshop on Hot Topics in System Dependability, HotDep 2005 (2005)
-
-
Griffin, J.L.1
Jaeger, T.2
Perez, R.3
Sailer, R.4
Van Doorn, L.5
Cáceres, R.6
-
2
-
-
70350642949
-
-
Technical Report RC23792, IBM Research
-
Bussani, A., Griffin, J.L., Jansen, B., Julisch, K., Karjoth, G., Maruyama, H., Nakamura, M., Perez, R., Schunter, M., Tanner, A., Van Doorn, L., Van Herreweghen, E.A., Waidner, M., Yoshihama, S.: Trusted Virtual Domains: Secure foundations for business and IT services. Technical Report RC23792, IBM Research (2005)
-
(2005)
Trusted Virtual Domains: Secure Foundations for Business and IT Services
-
-
Bussani, A.1
Griffin, J.L.2
Jansen, B.3
Julisch, K.4
Karjoth, G.5
Maruyama, H.6
Nakamura, M.7
Perez, R.8
Schunter, M.9
Tanner, A.10
Van Doorn, L.11
Van Herreweghen, E.A.12
Waidner, M.13
Yoshihama, S.14
-
3
-
-
77954991814
-
Towards Multi-Layer Trusted Virtual Domains
-
Katsuno, Y., Kudo, M., Perez, P., Sailer, R.: Towards Multi-Layer Trusted Virtual Domains. In: The 2nd Workshop on Advances in Trusted Computing (WATC 2006 Fall), Japanese Ministry of Economy, Trade and Industry, METI, Tokyo, Japan (2006)
-
The 2nd Workshop on Advances in Trusted Computing (WATC 2006 Fall), Japanese Ministry of Economy, Trade and Industry, METI, Tokyo, Japan (2006)
-
-
Katsuno, Y.1
Kudo, M.2
Perez, P.3
Sailer, R.4
-
4
-
-
54049153566
-
TVDc: Managing security in the trusted virtual datacenter
-
Berger, S., Cáceres, R., Pendarakis, D., Sailer, R., Valdez, E., Perez, R., Schildhauer, W., Srinivasan, D.: TVDc: managing security in the trusted virtual datacenter. SIGOPS Oper. Syst. Rev. 42, 40-47 (2008)
-
(2008)
SIGOPS Oper. Syst. Rev.
, vol.42
, pp. 40-47
-
-
Berger, S.1
Cáceres, R.2
Pendarakis, D.3
Sailer, R.4
Valdez, E.5
Perez, R.6
Schildhauer, W.7
Srinivasan, D.8
-
5
-
-
70350673437
-
Towards automated provisioning of secure virtualized networks
-
ACM, New York
-
Cabuk, S., Dalton, C.I., Ramasamy, H., Schunter, M.: Towards automated provisioning of secure virtualized networks. In: CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 235-245. ACM, New York (2007)
-
(2007)
CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 235-245
-
-
Cabuk, S.1
Dalton, C.I.2
Ramasamy, H.3
Schunter, M.4
-
6
-
-
33750248123
-
Building a MAC-based security architecture for the Xen open-source hypervisor
-
IEEE Computer Society, Los Alamitos
-
Sailer, R., Jaeger, T., Valdez, E., Perez, R., Berger, S., Griffin, J.L., van Doorn, L.: Building a MAC-based security architecture for the Xen open-source hypervisor. In: ACSAC 2005: Proceedings of the 21st Annual Computer Security Applications Conference. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
ACSAC 2005: Proceedings of the 21st Annual Computer Security Applications Conference
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Perez, R.4
Berger, S.5
Griffin, J.L.6
Van Doorn, L.7
-
7
-
-
34547205548
-
Linking remote attestation to secure tunnel endpoints
-
Goldman, K., Perez, R., Sailer, R.: Linking remote attestation to secure tunnel endpoints. In: STC 2006: Proceedings of the First ACM Workshop on Scalable Trusted Computing, pp. 21-24 (2006)
-
(2006)
STC 2006: Proceedings of the First ACM Workshop on Scalable Trusted Computing
, pp. 21-24
-
-
Goldman, K.1
Perez, R.2
Sailer, R.3
-
8
-
-
38149014725
-
Enabling fairer digital rights management with trusted computing
-
Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. Springer, Heidelberg
-
Asokan, N., Ekberg, J.E., Sadeghi, A.R., Sẗuble, C., Wolf, M.: Enabling fairer digital rights management with trusted computing. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 53-70. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4779
, pp. 53-70
-
-
Asokan, N.1
Ekberg, J.E.2
Sadeghi, A.R.3
Sẗuble, C.4
Wolf, M.5
-
9
-
-
70349245595
-
An efficient implementation of trusted channels based on OpenSSL
-
ACM, New York
-
Armknecht, F., Gasmi, Y., Sadeghi, A.R., Stewin, P., Unger, M., Ramunno, G., Vernizzi, D.: An efficient implementation of trusted channels based on OpenSSL. In: STC 2008: Proceedings of the 3rd ACMWorkshop on Scalable Trusted Computing, pp. 41-50. ACM, New York (2008)
-
(2008)
STC 2008: Proceedings of the 3rd ACMWorkshop on Scalable Trusted Computing
, pp. 41-50
-
-
Armknecht, F.1
Gasmi, Y.2
Sadeghi, A.R.3
Stewin, P.4
Unger, M.5
Ramunno, G.6
Vernizzi, D.7
-
10
-
-
84910156435
-
VTPM: Virtualizing the Trusted Platform Module
-
Berger, S., Caceres, R., Goldman, K.A., Perez, R., Sailer, R., van Doorn, L.: vTPM: Virtualizing the Trusted Platform Module. In: Proceedings of the 15th USENIX Security Symposium, USENIX, pp. 305-320 (2006)
-
(2006)
Proceedings of the 15th USENIX Security Symposium, USENIX
, pp. 305-320
-
-
Berger, S.1
Caceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
11
-
-
51849091963
-
TPM virtualization: Building a general framework
-
Pohlmann, N., Reimer, H. (eds.) Vieweg-Verlag
-
Scarlata, V., Rozas, C., Wiseman, M., Grawrock, D., Vishik, C.: TPM virtualization: Building a general framework. In: Pohlmann, N., Reimer, H. (eds.) Trusted Computing, pp. 43-56. Vieweg-Verlag (2007)
-
(2007)
Trusted Computing
, pp. 43-56
-
-
Scarlata, V.1
Rozas, C.2
Wiseman, M.3
Grawrock, D.4
Vishik, C.5
-
12
-
-
54249130839
-
Para-virtualized TPM sharing
-
Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. Springer, Heidelberg
-
England, P., Loeser, J.: Para-virtualized TPM sharing. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol. 4968, pp. 119-132. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4968
, pp. 119-132
-
-
England, P.1
Loeser, J.2
-
13
-
-
56649102115
-
Property-based TPM virtualization
-
Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. Springer, Heidelberg
-
Sadeghi, A.R., Sẗuble, C., Winandy, M.: Property-based TPM virtualization. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 1-16. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5222
, pp. 1-16
-
-
Sadeghi, A.R.1
Sẗuble, C.2
Winandy, M.3
-
16
-
-
38049026664
-
-
Technical Report RZ 3655 (#99675), IBM Research
-
Kuhlmann, D., Landfermann, R., Ramasamy, H.V., Schunter, M., Ramunno, G., Vernizzi, D.: An open trusted computing architecture - secure virtual machines enabling user-defined policy enforcement. Technical Report RZ 3655 (#99675), IBM Research (2006)
-
(2006)
An Open Trusted Computing Architecture - Secure Virtual Machines Enabling User-defined Policy Enforcement
-
-
Kuhlmann, D.1
Landfermann, R.2
Ramasamy, H.V.3
Schunter, M.4
Ramunno, G.5
Vernizzi, D.6
-
17
-
-
85084162914
-
Copilot - A coprocessor-based kernel runtime integrity monitor
-
Nick, L., Petroni, J., Fraser, T., Molina, J., Arbaugh,W.A.: Copilot - a coprocessor-based kernel runtime integrity monitor. In: Proceedings of the 13th USENIX Security Symposium, pp. 179-194 (2004)
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 179-194
-
-
Nick, L.1
Petroni, J.2
Fraser, T.3
Molina, J.4
Arbaugh, W.A.5
-
18
-
-
79959553321
-
Linux kernel integrity measurement using contextual inspection
-
ACM, New York
-
Loscocco, P.A., Wilson, P.W., Pendergrass, J.A., McDonell, C.D.: Linux kernel integrity measurement using contextual inspection. In: STC 2007: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, pp. 21-29. ACM, New York (2007)
-
(2007)
STC 2007: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing
, pp. 21-29
-
-
Loscocco, P.A.1
Wilson, P.W.2
Pendergrass, J.A.3
McDonell, C.D.4
-
20
-
-
48649085344
-
Secure and flexible monitoring of virtual machines
-
Payne, B.D., Carbone, M.D., Lee, W.: Secure and flexible monitoring of virtual machines. In: Proceedings of the 2007 Annual Computer Security Applications Conference, ACSAC 2007 (2007)
-
Proceedings of the 2007 Annual Computer Security Applications Conference, ACSAC 2007 (2007)
-
-
Payne, B.D.1
Carbone, M.D.2
Lee, W.3
-
21
-
-
70350637714
-
Trusted privacy domains - Challenges for trusted computing in privacy-protecting information sharing
-
Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. Springer, Heidelberg
-
Löhr, H., Sadeghi, A.R., Vishik, C., Winandy, M.: Trusted privacy domains - challenges for trusted computing in privacy-protecting information sharing. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 396-407. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5451
, pp. 396-407
-
-
Löhr, H.1
Sadeghi, A.R.2
Vishik, C.3
Winandy, M.4
-
22
-
-
77952371831
-
-
Trusted Computing Group Version 1.2 rev. 103
-
Trusted Computing Group: TPM Main Specification, Version 1.2 rev. 103 (2007)
-
(2007)
TPM Main Specification
-
-
-
23
-
-
84924573886
-
Transparent mobile storage protection in trusted virtual domains
-
USENIX Association
-
Catuogno, L., Manulis, M., L̈ohr, H., Sadeghi, A.R., Winandy, M.: Transparent mobile storage protection in trusted virtual domains. In: 23rd Large Installation System Administration Conference (LISA 2009). USENIX Association (2009)
-
(2009)
23rd Large Installation System Administration Conference (LISA 2009)
-
-
Catuogno, L.1
Manulis, M.2
L̈ohr, H.3
Sadeghi, A.R.4
Winandy, M.5
-
24
-
-
33947130171
-
Lazy revocation in cryptographic file systems
-
Backes, M., Cachin, C., Oprea, A.: Lazy revocation in cryptographic file systems. In: 3rd International IEEE Security in Storage Workshop (SISW 2005), San Francisco, California, USA, December 13, pp. 1-11 (2005)
-
(2005)
3rd International IEEE Security in Storage Workshop (SISW 2005), San Francisco, California, USA, December 13
, pp. 1-11
-
-
Backes, M.1
Cachin, C.2
Oprea, A.3
-
25
-
-
33750228447
-
Secure key-updating for lazy revocation
-
Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. Springer, Heidelberg
-
Backes, M., Cachin, C., Oprea, A.: Secure key-updating for lazy revocation. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 327-346. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4189
, pp. 327-346
-
-
Backes, M.1
Cachin, C.2
Oprea, A.3
-
26
-
-
21644433634
-
Xen and the art of virtualization
-
Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Pratt, I., Warfield, A., Barham, P., Neugebauer, R.: Xen and the art of virtualization. In: Proceedings of the ACM Symposium on Operating Systems Principles, pp. 164-177 (2003)
-
(2003)
Proceedings of the ACM Symposium on Operating Systems Principles
, pp. 164-177
-
-
Dragovic, B.1
Fraser, K.2
Hand, S.3
Harris, T.4
Ho, A.5
Pratt, I.6
Warfield, A.7
Barham, P.8
Neugebauer, R.9
-
29
-
-
4444265683
-
Xen and the art of virtualization
-
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: SOSP (2007)
-
(2007)
SOSP
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
32
-
-
77954963510
-
-
Sun Microsystems
-
Sun Microsystems: Virtualbox (2008)
-
(2008)
Virtualbox
-
-
-
34
-
-
70349241124
-
Leveraging IPsec for mandatory access control across systems
-
Jaeger, T., Butler,K., King,D.H., Hallyn, S., Latten, J., Zhang, X.: Leveraging IPsec for mandatory access control across systems. In: Proceedings of the Second International Conference on Security and Privacy in Communication Networks (2006)
-
Proceedings of the Second International Conference on Security and Privacy in Communication Networks (2006)
-
-
Jaeger, T.1
Butler, K.2
King, D.H.3
Hallyn, S.4
Latten, J.5
Zhang, X.6
-
40
-
-
33745883651
-
-
v2.0
-
Organization for the Advancement of Structured Information Standards (OASIS): eXtensible Access Control Markup Language (XACML) v2.0 (2005), http://www.oasis-open.org/specs/
-
(2005)
EXtensible Access Control Markup Language (XACML)
-
-
-
41
-
-
77955005592
-
Flexible and secure enterprise rights management based on trusted virtual domains
-
ACM, New York
-
Gasmi, Y., Husseiki, R., Sadeghi, A.R., Stewin, P., Sẗuble, C., Unger, M., Winandy, M.: Flexible and secure enterprise rights management based on trusted virtual domains. In: STC 2008: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing. ACM, New York (2008)
-
(2008)
STC 2008: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing
-
-
Gasmi, Y.1
Husseiki, R.2
Sadeghi, A.R.3
Stewin, P.4
Sẗuble, C.5
Unger, M.6
Winandy, M.7
-
42
-
-
77955006127
-
Towards automated security policy enforcement in multi-tenant virtual data centers
-
IOS Press, Amsterdam
-
Cabuk, S., Dalton, C.I., Eriksson, K., Kuhlmann, D., Ramasamy, H.G.V., Ramunno, G., Sadeghi, A.R., Schunter, M., Stüble, C.: Towards automated security policy enforcement in multi-tenant virtual data centers. In: Journal of Computer Science, Special Issue on EU's ICT Security Research. IOS Press, Amsterdam (2009)
-
(2009)
Journal of Computer Science, Special Issue on EU's ICT Security Research
-
-
Cabuk, S.1
Dalton, C.I.2
Eriksson, K.3
Kuhlmann, D.4
Ramasamy, H.G.V.5
Ramunno, G.6
Sadeghi, A.R.7
Schunter, M.8
Stüble, C.9
-
43
-
-
77954983075
-
Security for the cloud infrastructure: Trusted virtual data center implementation
-
12
-
Berger, S., Cáceres, R., Goldman, K., Pendarakis, D., Perez, R., Rao, J.R., Rom, E., Sailer, R., Schildhauer, W., Srinivasan, D., Tal, S., Valdez, E.: Security for the cloud infrastructure: Trusted virtual data center implementation. IBM Journal of Research and Development 53, 6:1-6:12 (2009)
-
(2009)
IBM Journal of Research and Development
, vol.53
, Issue.6
, pp. 1-6
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.3
Pendarakis, D.4
Perez, R.5
Rao, J.R.6
Rom, E.7
Sailer, R.8
Schildhauer, W.9
Srinivasan, D.10
Tal, S.11
Valdez, E.12
|