메뉴 건너뛰기




Volumn , Issue , 2010, Pages 43-48

Seeding clouds with trust anchors

Author keywords

Security

Indexed keywords

CENTRALIZED MANAGEMENT; CLOUD COMPUTING; CLOUD DATA; CLOUD VENDORS; CRITICAL DATA; DATA SECURITY; PROCESSING NEEDS; SECURITY;

EID: 78650083239     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866835.1866843     Document Type: Conference Paper
Times cited : (89)

References (26)
  • 1
    • 29244459228 scopus 로고    scopus 로고
    • A secure and reliable bootstrap architecture
    • IEEE Computer Society
    • ARBAUGH, W. A., FARBER, D. J., AND SMITH, J. M. A Secure and Reliable Bootstrap Architecture. In IEEE SP '97 (1997), IEEE Computer Society, p. 65.
    • (1997) IEEE SP '97 , pp. 65
    • Arbaugh, W.A.1    Farber, D.J.2    Smith, J.M.3
  • 2
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • April
    • BIBA, K. J. Integrity Considerations for Secure Computer Systems. Tech. Rep. MTR-3153, MITRE, April 1977.
    • (1977) Tech. Rep. MTR-3153, MITRE
    • Biba, K.J.1
  • 3
    • 78650092747 scopus 로고    scopus 로고
    • Analyzing and comparing the protection quality of security enhanced operating systems
    • CHEN, H., LI, N., AND MAO, Z. Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems. In NDSS (2009).
    • (2009) NDSS
    • Chen, H.1    Li, N.2    Mao, Z.3
  • 4
    • 48649110347 scopus 로고    scopus 로고
    • Establishing and sustaining system integrity via root of trust installation
    • Dec.
    • CLAIR, L. S., SCHIFFMAN, J., JAEGER, T., AND MCDANIEL, P. Establishing and sustaining system integrity via root of trust installation. In ACSAC (Dec. 2007).
    • (2007) ACSAC
    • Clair, L.S.1    Schiffman, J.2    Jaeger, T.3    Mcdaniel, P.4
  • 5
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • CLARK, D. D., AND WILSON, D. R. A Comparison of Commercial and Military Computer Security Policies. Security and Privacy 00 (1987), 184.
    • (1987) Security and Privacy 00 , pp. 184
    • Clark, D.D.1    Wilson, D.R.2
  • 6
    • 77955203646 scopus 로고    scopus 로고
    • A logic of secure systems and its application to trusted computing
    • May
    • DATTA, A., FRANKLIN, J., GARG, D., AND KAYNAR, D. A Logic of Secure Systems and its Application to Trusted Computing. In IEEE SP '09 (May 2009).
    • (2009) IEEE SP '09
    • Datta, A.1    Franklin, J.2    Garg, D.3    Kaynar, D.4
  • 7
    • 78650124726 scopus 로고    scopus 로고
    • Eucalyptus. http://www.eucalyptus.com/.
  • 12
    • 85077706009 scopus 로고    scopus 로고
    • Oslo: Improving the security of trusted computing
    • Berkeley, CA, USA USENIX Association
    • KAUER, B. Oslo: improving the security of trusted computing. In 16th USENIX Security Symposium (Berkeley, CA, USA, 2007), USENIX Association, pp. 1-9.
    • (2007) 16th USENIX Security Symposium , pp. 1-9
    • Kauer, B.1
  • 13
    • 72249120603 scopus 로고    scopus 로고
    • SeL4: Formal verification of an OS kernel
    • ACM
    • KLEIN, G., ET AL. seL4: Formal Verification of an OS Kernel. In SOSP '09 (2009), ACM, pp. 207-220.
    • (2009) SOSP '09 , pp. 207-220
    • Klein, G.1
  • 14
    • 85018519069 scopus 로고    scopus 로고
    • Safe passage for passwords and other sensitive data
    • Feb.
    • MCCUNE, J. M., PERRIG, A., AND REITER, M. K. Safe Passage for Passwords and Other Sensitive Data. In NDSS (Feb. 2009).
    • (2009) NDSS
    • Mccune, J.M.1    Perrig, A.2    Reiter, M.K.3
  • 17
    • 78650095683 scopus 로고    scopus 로고
    • Bootstrapping trust in commodity computers
    • May
    • PARNO, B., MCCUNE, J. M., AND PERRIG, A. Bootstrapping trust in commodity computers. In IEEE SP '10 (May 2010).
    • (2010) IEEE SP '10
    • Parno, B.1    Mccune, J.M.2    Perrig, A.3
  • 18
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
    • ACM
    • RISTENPART, T., TROMER, E., SHACHAM, H., AND SAVA G E, S. Hey, You, Get Off of my Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In CCS '09, ACM.
    • CCS '09
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Sava, G.E.S.4
  • 19
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • Aug. USENIX Association
    • SAILER, R., ZHANG, X., JAEGER, T., AND VAN DOORN, L. Design and Implementation of a TCG-based Integrity Measurement Architecture. In USENIX-SS '04 (Aug. 2004), USENIX Association.
    • (2004) USENIX-SS '04
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    Van Doorn, L.4
  • 23
    • 84863108148 scopus 로고    scopus 로고
    • BIND: A fine-grained attestation service for secure distributed systems
    • IEEE Computer Society
    • SHI, E., PERRIG, A., AND VAN DOORN, L. BIND: A Fine-Grained Attestation Service for Secure Distributed Systems. In IEEE SP '05 (2005), IEEE Computer Society.
    • (2005) IEEE SP '05
    • Shi, E.1    Perrig, A.2    Van Doorn, L.3
  • 24
    • 78650155228 scopus 로고    scopus 로고
    • Satem: Trusted service code execution across transactions
    • IEEE Computer Society
    • SHRIVASTAVA, S. Satem: Trusted Service Code Execution across Transactions. In SRDS '06 (2006), IEEE Computer Society, pp. 337-338.
    • (2006) SRDS '06 , pp. 337-338
    • Shrivastava, S.1
  • 25
    • 17444403861 scopus 로고    scopus 로고
    • Outbound authentication for programmable secure coprocessors
    • Oct.
    • SMITH, S. W. Outbound Authentication for Programmable Secure Coprocessors. In ESORICS (Oct. 2002).
    • (2002) ESORICS
    • Smith, S.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.