-
1
-
-
85170002460
-
-
IronKey. http://www.ironkey.com, 2009.
-
(2009)
IronKey
-
-
-
2
-
-
77958133720
-
-
Technical Report NAS-TR-0114-2009, Penn State Univ., Apr.
-
K. Butler, S. McLaughlin, T. Moyer, J. Schiffman, P. McDaniel, and T. Jaeger. Firma: Disk-Based Foundations for Trusted Operating Systems. Technical Report NAS-TR-0114-2009, Penn State Univ., Apr. 2009.
-
(2009)
Firma: Disk-Based Foundations for Trusted Operating Systems
-
-
Butler, K.1
McLaughlin, S.2
Moyer, T.3
Schiffman, J.4
McDaniel, P.5
Jaeger, T.6
-
7
-
-
0035474388
-
Building the IBM 4758 Secure Coprocessor
-
Oct.
-
J. G. Dyer, M. Lindermann, R. Perez, et al. Building the IBM 4758 Secure Coprocessor. IEEE Computer, 39(10):57-66, Oct. 2001.
-
(2001)
IEEE Computer
, vol.39
, Issue.10
, pp. 57-66
-
-
Dyer, J.G.1
Lindermann, M.2
Perez, R.3
-
8
-
-
0020778471
-
Scomp: A solution to the multilevel security problem
-
July
-
L. J. Fraim. Scomp: A solution to the multilevel security problem. IEEE Computer, 16(7):26-34, July 1983.
-
(1983)
IEEE Computer
, vol.16
, Issue.7
, pp. 26-34
-
-
Fraim, L.J.1
-
9
-
-
85170008984
-
On the difficulty of validating voting machine software with software
-
Aug.
-
R. Gardner, S. Garera, and A. D. Rubin. On the difficulty of validating voting machine software with software. In USENIX EVT, Aug. 2007.
-
(2007)
USENIX EVT
-
-
Gardner, R.1
Garera, S.2
Rubin, A.D.3
-
10
-
-
70450171759
-
Trustworthy and personalized computing on public kiosks
-
June
-
S. Garriss, R. Cáceres, S. Berger, R. Sailer, L. van Doorn, and X. Zhang. Trustworthy and personalized computing on public kiosks. In ACM MobiSys, June 2008.
-
(2008)
ACM MobiSys
-
-
Garriss, S.1
Cáceres, R.2
Berger, S.3
Sailer, R.4
Van Doorn, L.5
Zhang, X.6
-
11
-
-
0031611082
-
A Cost-Effective, High-Bandwidth Storage Architecture
-
G. A. Gibson, D. F. Nagle, K. Amiri, et al. A Cost-Effective, High-Bandwidth Storage Architecture. In ASPLOS, 1998.
-
(1998)
ASPLOS
-
-
Gibson, G.A.1
Nagle, D.F.2
Amiri, K.3
-
12
-
-
78751519878
-
Security Pipeline Interface (SPI)
-
Dec.
-
L. J. Hoffman and R. J. Davis. Security Pipeline Interface (SPI). In ACSAC, Dec. 1990.
-
(1990)
ACSAC
-
-
Hoffman, L.J.1
Davis, R.J.2
-
16
-
-
85170016500
-
Security tightened as secretary blamed for patient data loss
-
4 June
-
C. Lomax. Security tightened as secretary blamed for patient data loss. Telegraph & Argus, 4 June 2009.
-
(2009)
Telegraph & Argus
-
-
Lomax, C.1
-
17
-
-
84894902184
-
Turtles all the way down: Research challenges in user-based attestation
-
Aug.
-
J. M. McCune, A. Perrig, A. Seshadri, and L. van Doorn. Turtles all the way down: Research challenges in user-based attestation. In USENIX HotSec, Aug. 2007.
-
(2007)
USENIX HotSec
-
-
McCune, J.M.1
Perrig, A.2
Seshadri, A.3
Van Doorn, L.4
-
18
-
-
85170014571
-
-
Jan.
-
Microsoft. BitLocker and BitLocker to Go. http://technet.microsoft.com/ en-us/windows/dd408739.aspx, Jan. 2009.
-
(2009)
BitLocker and BitLocker to Go
-
-
-
20
-
-
85052678926
-
Bootstrapping trust in a "trusted" platform
-
Aug.
-
B. Parno. Bootstrapping trust in a "trusted" platform. In USENIX HotSec, Aug. 2008.
-
(2008)
USENIX HotSec
-
-
Parno, B.1
-
24
-
-
85170008195
-
-
SanDisk. SanDisk Cruzer Enterprise. http://www.sandisk.com/business- solutions/enterprise, 2009.
-
(2009)
SanDisk Cruzer Enterprise
-
-
-
26
-
-
84885617227
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
A. Seshadri, M. Luk, E. Shi, et al. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In ACM SOSP, 2005.
-
(2005)
ACM SOSP
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
-
28
-
-
78751499359
-
Under Worm Assault, Military Bans Disks, USB Drives
-
Nov.
-
N. Shachtman. Under Worm Assault, Military Bans Disks, USB Drives. Wired, Nov. 2008.
-
(2008)
Wired
-
-
Shachtman, N.1
-
31
-
-
12344286486
-
Cost profile of a highly assured, secure operating system
-
R. E. Smith. Cost profile of a highly assured, secure operating system. ACM Trans. Inf. Syst. Secur., 4(1):72-101, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.1
, pp. 72-101
-
-
Smith, R.E.1
-
32
-
-
85170014831
-
-
SRN Microsystems. Trojan.adware.win32.agent.bz. http://www.srnmicro.com/ virusinfo/trj10368.htm, 2009.
-
(2009)
Trojan.adware.win32.agent.bz
-
-
-
33
-
-
48649110347
-
Establishing and Sustaining System Integrity via Root of Trust Installation
-
L. St. Clair, J. Schiffman, T. Jaeger, and P. McDaniel. Establishing and Sustaining System Integrity via Root of Trust Installation. In ACSAC, 2007.
-
(2007)
ACSAC
-
-
St. Clair, L.1
Schiffman, J.2
Jaeger, T.3
McDaniel, P.4
-
34
-
-
84995392884
-
Self-Securing Storage: Protecting Data in Compromised Systems
-
J. Strunk, G. Goodson, M. Scheinholtz, et al. Self-Securing Storage: Protecting Data in Compromised Systems. In USENIX OSDI, 2000.
-
(2000)
USENIX OSDI
-
-
Strunk, J.1
Goodson, G.2
Scheinholtz, M.3
-
35
-
-
35348905103
-
Rapid trust establishment for pervasive personal computing
-
Oct.-Dec.
-
A. Surie, A. Perrig, M. Satyanarayanan, and D. J. Farber. Rapid trust establishment for pervasive personal computing. IEEE Pervasive Computing, 6(4):24-30, Oct.-Dec. 2007.
-
(2007)
IEEE Pervasive Computing
, vol.6
, Issue.4
, pp. 24-30
-
-
Surie, A.1
Perrig, A.2
Satyanarayanan, M.3
Farber, D.J.4
-
36
-
-
70749096362
-
-
TCG. Specification Version 1.2, Level 2 Revision 103. TCG, July
-
TCG. TPM Main: Part 1 - Design Principles. Specification Version 1.2, Level 2 Revision 103. TCG, July 2007.
-
(2007)
TPM Main: Part 1 - Design Principles
-
-
-
37
-
-
78649981929
-
-
TCG. Specification Version 1.0, Revision 1.0. Trusted Computing Group, Jan.
-
TCG. TCG Storage Security Subsystem Class: Opal. Specification Version 1.0, Revision 1.0. Trusted Computing Group, Jan. 2009.
-
(2009)
TCG Storage Security Subsystem Class: Opal
-
-
-
38
-
-
85170008163
-
The Zurich Trusted Information Channel - An Efficient Defence against Man-in-the-Middle and Malicious Software Attacks
-
T. Weigold, T. Kramp, R. Hermann, et al. The Zurich Trusted Information Channel - An Efficient Defence against Man-in-the-Middle and Malicious Software Attacks. In Proc. TRUST, Villach, Austria, Mar. 2008.
-
Proc. TRUST, Villach, Austria, Mar. 2008
-
-
Weigold, T.1
Kramp, T.2
Hermann, R.3
|