-
1
-
-
85091938288
-
-
Trusted Computing Group. Mar
-
Trusted Computing Group. http://www. trustedcomputinggroup.org/, Mar. 2005.
-
(2005)
-
-
-
2
-
-
0027809739
-
Authentication in the Taos Operating System
-
Asheville, NC, USA
-
M. Abadi, E. Wobber, M. Burrows, and B. Lampson. Authentication in the Taos Operating System. In Proceedings of the 14th ACM Symposium on Operating System Principles, pages 256-269, Asheville, NC, USA, 1993.
-
(1993)
Proceedings of the 14th ACM Symposium on Operating System Principles
, pp. 256-269
-
-
Abadi, M.1
Wobber, E.2
Burrows, M.3
Lampson, B.4
-
4
-
-
0004078695
-
The KeyNote Trust Management System, version 2
-
IETF RFC 2704, Sept
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis. The KeyNote Trust Management System, version 2. IETF RFC 2704, Sept. 1999.
-
(1999)
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A. D.4
-
7
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
Bolton Landing, NY, USA, Oct
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In Proceedings of the 19th ACM Symposium on Operating System Principles( SOSP 2003), Bolton Landing, NY, USA, Oct. 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating System Principles( SOSP 2003)
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
8
-
-
34548024814
-
Policy analysis and generation work at MITRE
-
March
-
A. L. Herzog, J. D. Guttman, D. R. Harris, J. D. Ramsdell, A. E. Segall, and B. T. Sniffen. Policy analysis and generation work at MITRE. In Proceedings of the first Annual Security-enhanced Linux Symposium, March 2005.
-
(2005)
Proceedings of the first Annual Security-enhanced Linux Symposium
-
-
Herzog, A. L.1
Guttman, J. D.2
Harris, D. R.3
Ramsdell, J. D.4
Segall, A. E.5
Sniffen, B. T.6
-
10
-
-
85091901573
-
Leveraging ipsec for mandatory perpacket access control
-
Baltimore, MD, USA, Aug
-
T. Jaeger, D. King, K. Butler, S. Hallyn, J. Latten, and X. Zhang. Leveraging ipsec for mandatory perpacket access control. In Proceedings of the Second IEEE Communications Society/CreateNet International Conference on Security and Privacy in Communication Networks, Baltimore, MD, USA, Aug. 2006.
-
(2006)
Proceedings of the Second IEEE Communications Society/CreateNet International Conference on Security and Privacy in Communication Networks
-
-
Jaeger, T.1
King, D.2
Butler, K.3
Hallyn, S.4
Latten, J.5
Zhang, X.6
-
11
-
-
33748062337
-
Prima: Policyreduced integrity measurements architecture
-
Lake Tahoe, NV, USA, June To appear
-
T. Jaeger, R. Sailer, and U. Shankar. Prima: Policyreduced integrity measurements architecture. In Proceedings of the 11th Symposium on Access Control Models and Technologies, Lake Tahoe, NV, USA, June 2006. To appear.
-
(2006)
Proceedings of the 11th Symposium on Access Control Models and Technologies
-
-
Jaeger, T.1
Sailer, R.2
Shankar, U.3
-
13
-
-
33751032041
-
Subvirt: Implementing malware with virtual machines
-
May
-
S. T. King, P. M. Chen, Y. Wang, C. Verbowski, H. J. Wang, and J. R. Lorch. Subvirt: Implementing malware with virtual machines. In Proceedings of the 2006 IEEE Symposium on Security and Privacy, May 2006.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
-
-
King, S. T.1
Chen, P. M.2
Wang, Y.3
Verbowski, C.4
Wang, H. J.5
Lorch, J. R.6
-
14
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
Feb
-
N. Li, B. N. Grosof, and J. Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM Transactions on Information and System Security (TISSEC), 6(1):128-171, Feb. 2003.
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B. N.2
Feigenbaum, J.3
-
15
-
-
0042352260
-
Separating key management from file system security
-
D. Mazieres, M. Kaminsky, M. F. Kaashoek, and E.Witchel. Separating key management from file system security. In Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP '99), pages 124-139, 1999.
-
(1999)
Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP '99)
, pp. 124-139
-
-
Mazieres, D.1
Kaminsky, M.2
Kaashoek, M. F.3
Witchel, E.4
-
16
-
-
34547165782
-
Deuterium: A system for distributed mandatory access control
-
Research Report RC23865, IBM T.J. Watson Research Center, Feb submission
-
J. McCune, S. Berger, R. Cáceres, T. Jaeger, and R. Sailer. Deuterium: A system for distributed mandatory access control. Research Report RC23865, IBM T.J. Watson Research Center, Feb. 2006. In submission.
-
(2006)
-
-
McCune, J.1
Berger, S.2
Cáceres, R.3
Jaeger, T.4
Sailer, R.5
-
17
-
-
27544489075
-
Seeing is believing: Using camera phones for human-verifiable authentication
-
address Oakland, CA, USA, month may, year
-
J. McCune, A. Perrig, and M. Reiter. Seeing is believing: Using camera phones for human-verifiable authentication", booktitle = "proceedings of the 2005 ieee symposium on security and privacy", address = Oakland, CA, USA, month = may, year = 2005.
-
(2005)
booktitle = "proceedings of the 2005 ieee symposium on security and privacy"
-
-
McCune, J.1
Perrig, A.2
Reiter, M.3
-
18
-
-
85091894392
-
-
RealVNC Ltd. July
-
RealVNC Ltd. About RealVNC, July 2006. http: //www.realvnc.com/.
-
(2006)
About RealVNC
-
-
-
20
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
San Diego, CA, USA, Aug
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In Proceedings of the 13th USENIX Security Symposium, San Diego, CA, USA, Aug. 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
van Doorn, L.4
-
21
-
-
79955682848
-
Toward automated information-flow integrity verification for security-critical applications
-
San Diego, CA, USA, Feb
-
U. Shankar, T. Jaeger, and R. Sailer. Toward automated information-flow integrity verification for security-critical applications. In Proceedings of the 2006 ISOC Networked and Distributed Systems Security Symposium (NDSS'06), San Diego, CA, USA, Feb. 2006.
-
(2006)
Proceedings of the 2006 ISOC Networked and Distributed Systems Security Symposium (NDSS'06)
-
-
Shankar, U.1
Jaeger, T.2
Sailer, R.3
-
23
-
-
85091911645
-
-
X.Org. X.Org Foundation, July
-
X.Org. X.Org Foundation, July 2006. http:// www.x.org/.
-
(2006)
-
-
|