-
3
-
-
85077741011
-
Storage-based intrusion detection: Watching storage activity for suspicious behavior
-
Usenix Assoc.
-
A.G. Pennington et al., "Storage-Based Intrusion Detection: Watching Storage Activity for Suspicious Behavior," Proc. 12th Usenix Security Symp., Usenix Assoc., 2003, pp. 137-152.
-
(2003)
Proc. 12th Usenix Security Symp.
, pp. 137-152
-
-
Pennington, A.G.1
-
4
-
-
74049149531
-
Non- volatile memory and disks: Avenues for policy architectures
-
ACM Press
-
K. Butler, S. McLaughlin, and P. McDaniel, "Non- Volatile Memory and Disks: Avenues for Policy Architectures," Proc. 1st ACM Computer Security Architectures Workshop (CSAW 07), ACM Press, 2007, pp. 77-84.
-
(2007)
Proc. 1st ACM Computer Security Architectures Workshop (CSAW 07)
, pp. 77-84
-
-
Butler, K.1
McLaughlin, S.2
McDaniel, P.3
-
5
-
-
0003400251
-
Secure computer systems: Mathematical foundations and model
-
Mitre
-
D. Bell and L. LaPadula, Secure Computer Systems: Mathematical Foundations and Model, tech. report M74-244, Mitre, 1973.
-
(1973)
Tech. Report M74-244
-
-
Bell, D.1
Lapadula, L.2
-
6
-
-
70349270845
-
Rootkit-resistant disks
-
ACM Press
-
K. Butler, S. McLaughlin, and P.D. McDaniel, "Rootkit-Resistant Disks," Proc. 15th ACM Conf. Computer and Communications Security (CCS 08), ACM Press, 2008, pp. 403-416.
-
(2008)
Proc. 15th ACM Conf. Computer and Communications Security (CCS 08)
, pp. 403-416
-
-
Butler, K.1
McLaughlin, S.2
McDaniel, P.D.3
-
9
-
-
84948594771
-
Fast dual SHA-1 and SHA-256 hash core for ASIC
-
"Fast Dual SHA-1 and SHA-256 Hash Core for ASIC," Helion Technology, 2005; www.heliontech.com/ multihash.htm.
-
(2005)
Helion Technology
-
-
-
10
-
-
77958121593
-
A guide to understanding audit in trusted systems
-
Nat'l Computer Security Center
-
A Guide to Understanding Audit in Trusted Systems, tech. report NCSC-TG-001, Tan Book, ed., Nat'l Computer Security Center, 1987.
-
(1987)
Tech. Report NCSC-TG-001
-
-
Book, T.1
-
11
-
-
77958141410
-
Switch blade: Policy-driven disk segmentation
-
Network and Security Research Center, Dept. of Computer Science and Eng., Pennsylvania State Univ.
-
K. Butler et al., SwitchBlade: Policy-Driven Disk Segmentation, tech. report NAS-TR-0098-2008, Network and Security Research Center, Dept. of Computer Science and Eng., Pennsylvania State Univ., 2008.
-
(2008)
Tech. Report NAS-TR-0098-2008
-
-
Butler, K.1
-
12
-
-
77958133720
-
Firma: Disk-based foundations for trusted operating systems
-
Network and Security Research Center, Dept. of Computer Science and Eng., Pennsylvania State Univ.
-
K. Butler et al., Firma: Disk-Based Foundations for Trusted Operating Systems, tech. report NAS-TR-0114-2009, Network and Security Research Center, Dept. of Computer Science and Eng., Pennsylvania State Univ., 2009.
-
(2009)
Tech. Report NAS-TR-0114-2009
-
-
Butler, K.1
|