-
1
-
-
21644433634
-
Xen and the art of virtualization
-
ACM Press
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. L. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In 19th ACM Symposium on Operating Systems Principles (SOSP'03), pages 164-177. ACM Press, 2003.
-
(2003)
19th ACM Symposium on Operating Systems Principles (SOSP'03)
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.L.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
2
-
-
54049153566
-
TVDc: Managing security in the trusted virtual datacenter
-
S. Berger, R. Cáceres, D. E. Pendarakis, R. Sailer, E. Valdez, R. Perez, W. Schildhauer, and D. Srinivasan. TVDc: Managing security in the trusted virtual datacenter. Operating Systems Review, 42(1):40-47, 2008.
-
(2008)
Operating Systems Review
, vol.42
, Issue.1
, pp. 40-47
-
-
Berger, S.1
Cáceres, R.2
Pendarakis, D.E.3
Sailer, R.4
Valdez, E.5
Perez, R.6
Schildhauer, W.7
Srinivasan, D.8
-
3
-
-
70350642949
-
-
Technical Report RC23792, IBM Research
-
A. Bussani, J. L. Griffin, B. Jansen, K. Julisch, G. Karjoth, H. Maruyama, M. Nakamura, R. Perez, M. Schunter, A. Tanner, L. V. Doorn, E. A. V. Herreweghen, M. Waidner, and S. Yoshihama. Trusted Virtual Domains: Secure foundations for business and IT services. Technical Report RC23792, IBM Research, 2005.
-
(2005)
Trusted Virtual Domains: Secure Foundations for Business and IT Services
-
-
Bussani, A.1
Griffin, J.L.2
Jansen, B.3
Julisch, K.4
Karjoth, G.5
Maruyama, H.6
Nakamura, M.7
Perez, R.8
Schunter, M.9
Tanner, A.10
Doorn, L.V.11
Herreweghen, E.A.V.12
Waidner, M.13
Yoshihama, S.14
-
4
-
-
71749093343
-
Towards automated security policy enforcement in multi-tenant virtual data centers
-
S. Cabuk, C. I. Dalton, K. Eriksson, D. Kuhlmann, H. V. Ramasamy, G. Ramunno, A.-R. Sadeghi, M. Schunter, and C. Stüble. Towards automated security policy enforcement in multi-tenant virtual data centers. Journal of Computer Security, 18(1):89-121, 2010.
-
(2010)
Journal of Computer Security
, vol.18
, Issue.1
, pp. 89-121
-
-
Cabuk, S.1
Dalton, C.I.2
Eriksson, K.3
Kuhlmann, D.4
Ramasamy, H.V.5
Ramunno, G.6
Sadeghi, A.-R.7
Schunter, M.8
Stüble, C.9
-
5
-
-
77954970860
-
Trusted Virtual Domains - Design, implementation and lessons learned
-
Springer Verlag
-
L. Catuogno, A. Dmitrienko, K. Eriksson, D. Kuhlmann, G. Ramunno, A.-R. Sadeghi, S. Schulz, M. Schunter, M. Winandy, and J. Zhan. Trusted Virtual Domains - design, implementation and lessons learned. In International Conference on Trusted Systems 2009 (INTRUST'09). Springer Verlag, 2009.
-
(2009)
International Conference on Trusted Systems 2009 (INTRUST'09)
-
-
Catuogno, L.1
Dmitrienko, A.2
Eriksson, K.3
Kuhlmann, D.4
Ramunno, G.5
Sadeghi, A.-R.6
Schulz, S.7
Schunter, M.8
Winandy, M.9
Zhan, J.10
-
6
-
-
78650951291
-
Trusted Virtual Domains: Color your network
-
L. Catuogno, H. Löhr, M. Manulis, A.-R. Sadeghi, C. Stüble, and M. Winandy. Trusted Virtual Domains: Color your network. Datenschutz und Datensicherheit (DuD), 5, 2010.
-
(2010)
Datenschutz und Datensicherheit (DuD)
, vol.5
-
-
Catuogno, L.1
Löhr, H.2
Manulis, M.3
Sadeghi, A.-R.4
Stüble, C.5
Winandy, M.6
-
7
-
-
84924573886
-
Transparent mobile storage protection in trusted virtual domains
-
USENIX Association
-
L. Catuogno, H. Löhr, M. Manulis, A.-R. Sadeghi, and M. Winandy. Transparent mobile storage protection in trusted virtual domains. In 23rd Large Installation System Administration Conference (LISA'09). USENIX Association, 2009.
-
(2009)
23rd Large Installation System Administration Conference (LISA'09)
-
-
Catuogno, L.1
Löhr, H.2
Manulis, M.3
Sadeghi, A.-R.4
Winandy, M.5
-
8
-
-
77954342748
-
-
Common Criteria Project Sponsoring Organisations Version 3 1, July
-
Common Criteria Project Sponsoring Organisations. Common Criteria for Information Technology Security Evaluation, Version 3.1, July 2009. http://www.commoncriteriaportal.org/thecc.html.
-
(2009)
Common Criteria for Information Technology Security Evaluation
-
-
-
9
-
-
79952612270
-
Beyond secure channels
-
ACM Press
-
Y. Gasmi, A.-R. Sadeghi, P. Stewin, M. Unger, and N. Asokan. Beyond secure channels. In 2nd ACM Workshop on Scalable Trusted Computing (STC'07), pages 30-40. ACM Press, 2007.
-
(2007)
2nd ACM Workshop on Scalable Trusted Computing (STC'07)
, pp. 30-40
-
-
Gasmi, Y.1
Sadeghi, A.-R.2
Stewin, P.3
Unger, M.4
Asokan, N.5
-
13
-
-
34250717227
-
Trusted Virtual Domains: Toward secure distributed services
-
J. L. Griffin, T. Jaeger, R. Perez, R. Sailer, L. van Doorn, and R. Cáceres. Trusted Virtual Domains: Toward secure distributed services. In Proceedings of the 1st IEEE Workshop on Hot Topics in System Dependability (HotDep'05), June 2005.
-
Proceedings of the 1st IEEE Workshop on Hot Topics in System Dependability (HotDep'05), June 2005
-
-
Griffin, J.L.1
Jaeger, T.2
Perez, R.3
Sailer, R.4
Van Doorn, L.5
Cáceres, R.6
-
15
-
-
77950527057
-
A resource-sharing platform for trading biomedical intellectual property
-
C.-Y. Hsu, Y.-C. Chen, R.-C. Luo, H.-H. Rau, C.-T. Fan, B.-S. Hsiao, and H.-W. Chiu. A resource-sharing platform for trading biomedical intellectual property. IT Professional, 12:42-49, 2010.
-
(2010)
IT Professional
, vol.12
, pp. 42-49
-
-
Hsu, C.-Y.1
Chen, Y.-C.2
Luo, R.-C.3
Rau, H.-H.4
Fan, C.-T.5
Hsiao, B.-S.6
Chiu, H.-W.7
-
16
-
-
84875040423
-
-
International Organization for Standardization (ISO). Technical Committee 215, Health Informatics. http://www.iso.org/iso/iso-technical-committee?commid= 54960.
-
Health Informatics
-
-
-
17
-
-
78650931094
-
-
Kassenärztliche Bundesvereinigung. KV-SafeNet homepage. http://www.kbv.de/12705.html.
-
KV-SafeNet Homepage
-
-
-
19
-
-
70350647626
-
Modeling trusted computing support in a protection profile for high assurance security kernels
-
Trusted Computing, 2nd International Conference, Trust 2009, Springer
-
H. Löhr, A.-R. Sadeghi, C. Stüble, M. Weber, and M. Winandy. Modeling trusted computing support in a protection profile for high assurance security kernels. In Trusted Computing, 2nd International Conference, Trust 2009, volume 5471 of Lecture Notes in Computer Science, pages 45-62. Springer, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5471
, pp. 45-62
-
-
Löhr, H.1
Sadeghi, A.-R.2
Stüble, C.3
Weber, M.4
Winandy, M.5
-
20
-
-
70350637714
-
Trusted privacy domains - Challenges for trusted computing in privacy-protecting information sharing
-
Information Security Practice and Experience, 5th International Conference, (ISPEC'09), Springer
-
H. Löhr, A. R. Sadeghi, C. Vishik, and M. Winandy. Trusted privacy domains - challenges for trusted computing in privacy-protecting information sharing. In Information Security Practice and Experience, 5th International Conference, (ISPEC'09), volume 5451 of Lecture Notes in Computer Science, pages 396-407. Springer, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5451
, pp. 396-407
-
-
Löhr, H.1
Sadeghi, A.R.2
Vishik, C.3
Winandy, M.4
-
21
-
-
77952390493
-
Patterns for secure boot and secure storage in computer systems
-
4th International Workshop of Secure System Methodologies Using Patterns (SPattern 2010), IEEE Computer Society
-
H. Löhr, A.-R. Sadeghi, and M. Winandy. Patterns for secure boot and secure storage in computer systems. In 4th International Workshop of Secure System Methodologies Using Patterns (SPattern 2010), In Proc. of Fifth International Conference on Availability, Reliability and Security (ARES'10), pages 569-573. IEEE Computer Society, 2010.
-
(2010)
Proc. of Fifth International Conference on Availability, Reliability and Security (ARES'10)
, pp. 569-573
-
-
Löhr, H.1
Sadeghi, A.-R.2
Winandy, M.3
-
22
-
-
77950538717
-
Developing electronic health records in Taiwan
-
H.-H. Rau, C.-Y. Hsu, Y.-L. Lee, W. Chen, and W.-S. Jian. Developing electronic health records in Taiwan. IT Professional, 12:17-25, 2010.
-
(2010)
IT Professional
, vol.12
, pp. 17-25
-
-
Rau, H.-H.1
Hsu, C.-Y.2
Lee, Y.-L.3
Chen, W.4
Jian, W.-S.5
-
23
-
-
33644560043
-
From a paper-based transmission of discharge summaries to electronic communication in health care regions
-
T. Schabetsberger, E. Ammenwerth, S. Andreatta, G. Gratl, R. Haux, G. Lechleitner, K. Schindelwig, C. Stark, R. Vogl, I. Wilhelmy, and F. Wozak. From a paper-based transmission of discharge summaries to electronic communication in health care regions. International Journal of Medical Informatics, 75:209-215, 2006.
-
(2006)
International Journal of Medical Informatics
, vol.75
, pp. 209-215
-
-
Schabetsberger, T.1
Ammenwerth, E.2
Andreatta, S.3
Gratl, G.4
Haux, R.5
Lechleitner, G.6
Schindelwig, K.7
Stark, C.8
Vogl, R.9
Wilhelmy, I.10
Wozak, F.11
-
25
-
-
74549188110
-
Security analysis of the german electronic health card's peripheral parts
-
Milan, Italy, May 6-10, 2009
-
A. Sunyaev, A. Kaletsch, C. Mauro, and H. Krcmar. Security analysis of the german electronic health card's peripheral parts. In ICEIS 2009 - Proceedings of the 11th International Conference on Enterprise Information Systems, Volume ISAS, Milan, Italy, May 6-10, 2009, pages 19-26, 2009.
-
(2009)
ICEIS 2009 - Proceedings of the 11th International Conference on Enterprise Information Systems
, vol.ISAS
, pp. 19-26
-
-
Sunyaev, A.1
Kaletsch, A.2
Mauro, C.3
Krcmar, H.4
-
27
-
-
77952371831
-
-
Trusted Computing Group Version 1.2 rev. 103, July
-
Trusted Computing Group. TPM Main Specification, Version 1.2 rev. 103, July 2007. https://www.trustedcomputinggroup.org.
-
(2007)
TPM Main Specification
-
-
|