-
1
-
-
29244459228
-
A secure and reliable bootstrap architecture
-
IEEE Computer Society
-
ARBAUGH, W. A., FARBER, D. J., AND SMITH, J. M. A Secure and Reliable Bootstrap Architecture. In IEEE SP '97 (1997), IEEE Computer Society, p. 65.
-
(1997)
IEEE SP '97
, pp. 65
-
-
Arbaugh, W.A.1
Farber, D.J.2
Smith, J.M.3
-
2
-
-
0003400255
-
Integrity considerations for secure computer systems
-
April
-
BIBA, K. J. Integrity Considerations for Secure Computer Systems. Tech. Rep. MTR-3153, MITRE, April 1977.
-
(1977)
Tech. Rep. MTR-3153, MITRE
-
-
Biba, K.J.1
-
3
-
-
78650092747
-
Analyzing and comparing the protection quality of security enhanced operating systems
-
CHEN, H., LI, N., AND MAO, Z. Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems. In NDSS (2009).
-
(2009)
NDSS
-
-
Chen, H.1
Li, N.2
Mao, Z.3
-
4
-
-
48649110347
-
Establishing and sustaining system integrity via root of trust installation
-
Dec.
-
CLAIR, L. S., SCHIFFMAN, J., JAEGER, T., AND MCDANIEL, P. Establishing and sustaining system integrity via root of trust installation. In ACSAC (Dec. 2007).
-
(2007)
ACSAC
-
-
Clair, L.S.1
Schiffman, J.2
Jaeger, T.3
Mcdaniel, P.4
-
5
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
CLARK, D. D., AND WILSON, D. R. A Comparison of Commercial and Military Computer Security Policies. Security and Privacy 00 (1987), 184.
-
(1987)
Security and Privacy 00
, pp. 184
-
-
Clark, D.D.1
Wilson, D.R.2
-
6
-
-
77955203646
-
A logic of secure systems and its application to trusted computing
-
May
-
DATTA, A., FRANKLIN, J., GARG, D., AND KAYNAR, D. A Logic of Secure Systems and its Application to Trusted Computing. In IEEE SP '09 (May 2009).
-
(2009)
IEEE SP '09
-
-
Datta, A.1
Franklin, J.2
Garg, D.3
Kaynar, D.4
-
7
-
-
78650124726
-
-
Eucalyptus. http://www.eucalyptus.com/.
-
-
-
-
12
-
-
85077706009
-
Oslo: Improving the security of trusted computing
-
Berkeley, CA, USA USENIX Association
-
KAUER, B. Oslo: improving the security of trusted computing. In 16th USENIX Security Symposium (Berkeley, CA, USA, 2007), USENIX Association, pp. 1-9.
-
(2007)
16th USENIX Security Symposium
, pp. 1-9
-
-
Kauer, B.1
-
13
-
-
72249120603
-
SeL4: Formal verification of an OS kernel
-
ACM
-
KLEIN, G., ET AL. seL4: Formal Verification of an OS Kernel. In SOSP '09 (2009), ACM, pp. 207-220.
-
(2009)
SOSP '09
, pp. 207-220
-
-
Klein, G.1
-
14
-
-
85018519069
-
Safe passage for passwords and other sensitive data
-
Feb.
-
MCCUNE, J. M., PERRIG, A., AND REITER, M. K. Safe Passage for Passwords and Other Sensitive Data. In NDSS (Feb. 2009).
-
(2009)
NDSS
-
-
Mccune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
15
-
-
77950901995
-
Scalable web content attestation
-
MOYER, T., BUTLER, K., SCHIFFMAN, J., MCDANIEL, P., AND JAEGER, T. Scalable Web Content Attestation. In ACSAC '09 (2009).
-
(2009)
ACSAC '09
-
-
Moyer, T.1
Butler, K.2
Schiffman, J.3
Mcdaniel, P.4
Jaeger, T.5
-
16
-
-
72849116409
-
Property based attestation and trusted computing: Analysis and challenges
-
Washington, DC, USA IEEE Computer Society
-
NAGARAJAN, A., VARADHARAJAN, V., HITCHENS, M., AND GALLERY, E. Property based attestation and trusted computing: Analysis and challenges. In International Conference on Network and System Security (Washington, DC, USA, 2009), IEEE Computer Society, pp. 278-285.
-
(2009)
International Conference on Network and System Security
, pp. 278-285
-
-
Nagarajan, A.1
Varadharajan, V.2
Hitchens, M.3
Gallery, E.4
-
17
-
-
78650095683
-
Bootstrapping trust in commodity computers
-
May
-
PARNO, B., MCCUNE, J. M., AND PERRIG, A. Bootstrapping trust in commodity computers. In IEEE SP '10 (May 2010).
-
(2010)
IEEE SP '10
-
-
Parno, B.1
Mccune, J.M.2
Perrig, A.3
-
18
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM
-
RISTENPART, T., TROMER, E., SHACHAM, H., AND SAVA G E, S. Hey, You, Get Off of my Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In CCS '09, ACM.
-
CCS '09
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Sava, G.E.S.4
-
19
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
Aug. USENIX Association
-
SAILER, R., ZHANG, X., JAEGER, T., AND VAN DOORN, L. Design and Implementation of a TCG-based Integrity Measurement Architecture. In USENIX-SS '04 (Aug. 2004), USENIX Association.
-
(2004)
USENIX-SS '04
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
20
-
-
84929445167
-
Towards trusted cloud computing
-
San Diego, CA, June
-
SANTOS, N., GUMMADI, K. P., AND RODRIGUES, R. Towards trusted cloud computing. In Proceedings of USENIX HotCloud'09: Workshop on Hot Topics in Cloud Computing (San Diego, CA, June 2009).
-
(2009)
Proceedings of USENIX HotCloud'09: Workshop on Hot Topics in Cloud Computing
-
-
Santos, N.1
Gummadi, K.P.2
Rodrigues, R.3
-
21
-
-
78650121776
-
Network-based root of trust for installation
-
Network and Security Research Center, June
-
SCHIFFMAN, J., JAEGER, T., AND MCDANIEL, P. Network-based Root of Trust for Installation. Tech. Rep. Technical Report NAS-TR-0135-2010, Network and Security Research Center, June 2010.
-
(2010)
Tech. Rep. Technical Report NAS-TR-0135-2010
-
-
Schiffman, J.1
Jaeger, T.2
Mcdaniel, P.3
-
22
-
-
77950793589
-
Justifying integrity using a virtual machine verifier
-
ACSA
-
SCHIFFMAN, J., MOYER, T., SHAL, C., JAEGER, T., AND MCDANIEL, P. Justifying integrity using a Virtual Machine Verifier. In ACSAC '09 (2009), ACSA.
-
(2009)
ACSAC '09
-
-
Schiffman, J.1
Moyer, T.2
Shal, C.3
Jaeger, T.4
Mcdaniel, P.5
-
23
-
-
84863108148
-
BIND: A fine-grained attestation service for secure distributed systems
-
IEEE Computer Society
-
SHI, E., PERRIG, A., AND VAN DOORN, L. BIND: A Fine-Grained Attestation Service for Secure Distributed Systems. In IEEE SP '05 (2005), IEEE Computer Society.
-
(2005)
IEEE SP '05
-
-
Shi, E.1
Perrig, A.2
Van Doorn, L.3
-
24
-
-
78650155228
-
Satem: Trusted service code execution across transactions
-
IEEE Computer Society
-
SHRIVASTAVA, S. Satem: Trusted Service Code Execution across Transactions. In SRDS '06 (2006), IEEE Computer Society, pp. 337-338.
-
(2006)
SRDS '06
, pp. 337-338
-
-
Shrivastava, S.1
-
25
-
-
17444403861
-
Outbound authentication for programmable secure coprocessors
-
Oct.
-
SMITH, S. W. Outbound Authentication for Programmable Secure Coprocessors. In ESORICS (Oct. 2002).
-
(2002)
ESORICS
-
-
Smith, S.W.1
-
26
-
-
78650112395
-
Integrity walls: Finding attack surfaces from mandatory access control policies
-
Feb.
-
VIJAYAKUMAR, H., JAKKA, G., RUEDA, S., SCHIFFMAN, J., AND JAEGER, T. Integrity Walls: Finding attack surfaces from mandatory access control policies. Tech. Rep. NAS-TR-0124-2010, NSRC, Feb. 2010.
-
(2010)
Tech. Rep. NAS-TR-0124-2010, NSRC
-
-
Vijayakumar, H.1
Jakka, G.2
Rueda, S.3
Schiffman, J.4
Jaeger, T.5
|