-
4
-
-
2442768922
-
TCFS: Transparent Cryptographic File System
-
E. Mauriello, "TCFS: Transparent Cryptographic File System," Linux Journal, vol. 40, 1997.
-
(1997)
Linux Journal
, vol.40
-
-
Mauriello, E.1
-
7
-
-
33846483949
-
Intel virtualization technology: Hardware support for efficient processor virtualization
-
G. Neiger, A. Santoni, F. Leung, D. Rodgers, and R. Uhlig, "Intel virtualization technology: Hardware support for efficient processor virtualization," Intel Technology Journal (http://www.intel.com/technology/ itj/2006/v10i3/), 2006.
-
(2006)
Intel Technology Journal
-
-
Neiger, G.1
Santoni, A.2
Leung, F.3
Rodgers, D.4
Uhlig, R.5
-
9
-
-
67650079952
-
BitVisor: A thin hypervisor for enforcing i/o device security
-
ACM
-
T. Shinagawa, H. Eiraku, K. Tanimoto, K. Omote, S. Hasegawa, T. Horie, M. Hirano, K. Kourai, Y. Oyama, and E. Kawai, "BitVisor: a thin hypervisor for enforcing i/o device security," Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, ACM, 2009, pp. 121-130.
-
(2009)
Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments
, pp. 121-130
-
-
Shinagawa, T.1
Eiraku, H.2
Tanimoto, K.3
Omote, K.4
Hasegawa, S.5
Horie, T.6
Hirano, M.7
Kourai, K.8
Oyama, Y.9
Kawai, E.10
-
10
-
-
78650882184
-
Terra: A virtual machine-based platform for trusted computing
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, "Terra: A virtual machine-based platform for trusted computing," ACM SIGOPS Operating Systems Review, vol. 37, 2003, p. 206.
-
(2003)
ACM SIGOPS Operating Systems Review
, vol.37
, pp. 206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
11
-
-
41149103393
-
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
ACM
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig, "SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes," Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, ACM, 2007, p. 350.
-
(2007)
Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles
, pp. 350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
12
-
-
77952329878
-
Improving Xen security through disaggregation
-
ACM
-
D. G. Murray, G. Milos, and S. Hand, "Improving Xen security through disaggregation," Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, ACM, 2008, pp. 151-160.
-
(2008)
Proceedings of the Fourth ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments
, pp. 151-160
-
-
Murray, D.G.1
Milos, G.2
Hand, S.3
-
13
-
-
34748842601
-
Reducing TCB complexity for security-sensitive applications: Three case studies
-
ACM
-
L. Singaravelu, C. Pu, H. Härtig, and C. Helmuth, "Reducing TCB complexity for security-sensitive applications: Three case studies," Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006, ACM, 2006, p. 174.
-
(2006)
Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006
, pp. 174
-
-
Singaravelu, L.1
Pu, C.2
Härtig, H.3
Helmuth, C.4
-
14
-
-
77957808684
-
The design and implementation of microdrivers
-
ACM
-
V. Ganapathy, M.J. Renzelmann, A. Balakrishnan, M.M. Swift, and S. Jha, "The design and implementation of microdrivers," Proceedings of the 13th international conference on Architectural support for programming languages and operating systems, ACM, 2008, pp. 168-178.
-
(2008)
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 168-178
-
-
Ganapathy, V.1
Renzelmann, M.J.2
Balakrishnan, A.3
Swift, M.M.4
Jha, S.5
-
15
-
-
21644433634
-
Xen and the art of virtualization
-
ACM
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, "Xen and the art of virtualization," Proceedings of the nineteenth ACM symposium on Operating systems principles, ACM, 2003, p. 177.
-
(2003)
Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles
, pp. 177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
17
-
-
47749115939
-
QEMU a Multihost Multitarget Emulator
-
D. Bartholomew, "QEMU a Multihost Multitarget Emulator," Linux Journal, vol. 145,2006, p. 3.
-
(2006)
Linux Journal
, vol.145
, pp. 3
-
-
Bartholomew, D.1
-
19
-
-
43749085907
-
ECryptFS: An enterprise-class encrypted filesystem for linux
-
Citeseer
-
M. A. Halcrow, "eCryptFS: An enterprise-class encrypted filesystem for linux," Proceedings of the 2005 Linux Symposium, Citeseer, pp. 201-218.
-
Proceedings of the 2005 Linux Symposium
, pp. 201-218
-
-
Halcrow, M.A.1
-
21
-
-
79951475064
-
-
Microsoft Corporation, TechNet Security Homepage
-
R. Bragg, O.T. Page, W. Is, B. How-tos, H. Works, E. How-tos, E.F.S. Radical, E.F.S. Using, E.F.S. Using, and D. Recovery, The Encrypting File System, Microsoft Corporation, TechNet Security Homepage, 2008.
-
(2008)
The Encrypting File System
-
-
Bragg, R.1
Page, O.T.2
Is, W.3
How-tos, B.4
Works, H.5
How-tos, E.6
Radical, E.F.S.7
Using, E.F.S.8
Using, E.F.S.9
Recovery, D.10
-
23
-
-
20344391930
-
Intel virtualization technology
-
R. Uhlig, G. Neiger, D. Rodgers, A.L. Santoni, F.C.M. Martins, A.V. Anderson, S.M. Bennett, A. Kagi, F.H. Leung, and L. Smith, "Intel virtualization technology," Computer, vol. 38, 2005, pp. 48-56.
-
(2005)
Computer
, vol.38
, pp. 48-56
-
-
Uhlig, R.1
Neiger, G.2
Rodgers, D.3
Santoni, A.L.4
Martins, F.C.M.5
Anderson, A.V.6
Bennett, S.M.7
Kagi, A.8
Leung, F.H.9
Smith, L.10
-
25
-
-
70449466613
-
A Two-Step Execution Mechanism for Thin Secure Hypervisors
-
IEEE
-
M. Hirano, T. Shinagawa, H. Eiraku, S. Hasegawa, K. Omote, K. Tanimoto, T. Horie, S. Mune, K. Kato, and T. Okuda, "A Two-Step Execution Mechanism for Thin Secure Hypervisors," 2009 Third International Conference on Emerging Security Information, Systems and Technologies, IEEE, 2009, pp. 129-135.
-
(2009)
2009 Third International Conference on Emerging Security Information, Systems and Technologies
, pp. 129-135
-
-
Hirano, M.1
Shinagawa, T.2
Eiraku, H.3
Hasegawa, S.4
Omote, K.5
Tanimoto, K.6
Horie, T.7
Mune, S.8
Kato, K.9
Okuda, T.10
-
26
-
-
84958802026
-
A digital signature based on a conventional encryption function
-
Springer
-
R. Merkle, "A digital signature based on a conventional encryption function," Advances in Cryptology - CRYPTO '87, Springer, 1987, pp. 369-378.
-
(1987)
Advances in Cryptology - CRYPTO '87
, pp. 369-378
-
-
Merkle, R.1
|