-
1
-
-
74049121230
-
Dynamic provable data possession
-
New York, NY, USA: ACM
-
C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, "Dynamic provable data possession," in CCS '09: Proceedings of the 16th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2009, pp. 213-222.
-
(2009)
CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 213-222
-
-
Erway, C.1
Küpçü, A.2
Papamanthou, C.3
Tamassia, R.4
-
2
-
-
77954931916
-
Privacy in the clouds: Risks to privacy and confidentiality from cloud computing
-
R. Gellmax, "Privacy in the clouds: Risks to privacy and confidentiality from cloud computing," World privacy forum, pp. 1-26, 2009.
-
(2009)
World Privacy Forum
, pp. 1-26
-
-
Gellmax, R.1
-
4
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
New York, NY, USA: ACM
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," in CCS '09: Proceedings of the 16th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2009, pp. 199-212.
-
(2009)
CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
5
-
-
68149092220
-
Trusted computing: Security and applications
-
(to appear)
-
E. Gallery and C. J. Mitchell, "Trusted computing: Security and applications," Cryptologia, (to appear).
-
Cryptologia
-
-
Gallery, E.1
Mitchell, C.J.2
-
6
-
-
77954418560
-
-
August [Online]. Available: https://www.trustedcomputinggroup.org/groups/ -TCG-1-4-Architecture-Overview.pdf
-
"TCG architecture overview," August 2007, https://www. trustedcomputinggroup.org/groups/TCG-1-4-Architecture-Overview.pdf. [Online]. Available: https://www.trustedcomputinggroup.org/groups/-TCG-1-4-Architecture- Overview.pdf
-
(2007)
TCG Architecture Overview
-
-
-
7
-
-
31344435929
-
Cryptographic processors - A survey
-
February
-
R. Anderson, M. Bond, J. Clulow, and S. Skorobogatov, "Cryptographic processors - a survey," Proceedings of the IEEE, vol. 94, no. 2, pp. 357-369, February 2006.
-
(2006)
Proceedings of the IEEE
, vol.94
, Issue.2
, pp. 357-369
-
-
Anderson, R.1
Bond, M.2
Clulow, J.3
Skorobogatov, S.4
-
8
-
-
0030672130
-
A secure and reliable bootstrap architecture
-
IEEE Computer Society
-
W. A. Arbaugh, D. J. Farber, and J. M. Smith, "A secure and reliable bootstrap architecture," in IEEE Symposium on Security and Privacy. IEEE Computer Society, 1997, p. 65.
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 65
-
-
Arbaugh, W.A.1
Farber, D.J.2
Smith, J.M.3
-
9
-
-
0035474388
-
Building the IBM 4758 secure coprocessor
-
October
-
J. G. Dyer, M. Lindemann, R. Perez, R. Sailer, L. van Doorn, S. W. Smith, and S. Weingart, "Building the IBM 4758 secure coprocessor," Computer, vol. 34, no. 10, pp. 57-66, October 2001.
-
(2001)
Computer
, vol.34
, Issue.10
, pp. 57-66
-
-
Dyer, J.G.1
Lindemann, M.2
Perez, R.3
Sailer, R.4
Van Doorn, L.5
Smith, S.W.6
Weingart, S.7
-
10
-
-
33646075344
-
Outbound authentication for programmable secure coprocessors
-
October
-
S. W. Smith, "Outbound authentication for programmable secure coprocessors," International Journal of Information Security, vol. 3, no. 1, pp. 28-41, October 2004.
-
(2004)
International Journal of Information Security
, vol.3
, Issue.1
, pp. 28-41
-
-
Smith, S.W.1
-
11
-
-
18844391719
-
-
[Online]. Available: http://www.trustedcomputinggroup.org
-
"Trusted computing group," http://www.trustedcomputinggroup. org. [Online]. Available: http://www.trustedcomputinggroup.org
-
Trusted Computing Group
-
-
-
12
-
-
33646445517
-
NGSCB: A trusted open system
-
M. Peinado, Y. Chen, P. Engl, and J. Manferdelli, "NGSCB: A trusted open system," in 9th Australasian Conference on Information Security and Privacy. Springer, 2004, pp. 86-97.
-
(2004)
9th Australasian Conference on Information Security and Privacy. Springer
, pp. 86-97
-
-
Peinado, M.1
Chen, Y.2
Engl, P.3
Manferdelli, J.4
-
13
-
-
79957905089
-
-
[Online]. Available: http://www.intel.com/technology/security
-
"Trusted execution technology architectural overview," http://www.intel.com/technology/security. [Online]. Available: http://www.intel.com/technology/security
-
Trusted Execution Technology Architectural Overview
-
-
-
15
-
-
38049026664
-
-
June [Online]
-
D. Kuhlmann, R. Landfermanny, H. V. Ramasamyz, M. Schunterz, G. Ramunno, and D. Vernizzi, "An open trusted computing architecture secure virtual machines enabling user-defined policy enforcement," June 2006. [Online]. Available: http://domino.watson.ibm.com/library/cyberdig.nsf/papers/ 7024C307EA0DFAEE852571D0003B10F3/File/rz3655.pdf
-
(2006)
An Open Trusted Computing Architecture Secure Virtual Machines Enabling User-defined Policy Enforcement
-
-
Kuhlmann, D.1
Landfermanny, R.2
Ramasamyz, H.V.3
Schunterz, M.4
Ramunno, G.5
Vernizzi, D.6
-
16
-
-
37149044968
-
Aegis: A single-chip secure processor
-
G. E. Suh, C. W. O'Donnell, and S. Devadas, "Aegis: A single-chip secure processor," IEEE Design & Test, vol. 24, no. 6, pp. 570-580, 2007.
-
(2007)
IEEE Design & Test
, vol.24
, Issue.6
, pp. 570-580
-
-
Suh, G.E.1
O'Donnell, C.W.2
Devadas, S.3
-
18
-
-
46449133585
-
Towards trustworthy kiosk computing
-
IEEE Computer Society
-
S. Garriss, R. Cáceres, S. Berger, R. Sailer, L. van Doorn, and X. Zhang, "Towards trustworthy kiosk computing," in Eighth IEEE Workshop on Mobile Computing Systems and Applications. IEEE Computer Society, 2007, pp. 41-45.
-
(2007)
Eighth IEEE Workshop on Mobile Computing Systems and Applications
, pp. 41-45
-
-
Garriss, S.1
Cáceres, R.2
Berger, S.3
Sailer, R.4
Van Doorn, L.5
Zhang, X.6
-
21
-
-
24644461219
-
Short linkable ring signatures for e-voting, e-cash and attestation
-
Springer
-
P. P. Tsang and V. K. Wei, "Short linkable ring signatures for e-voting, e-cash and attestation," in Information Security Practice and Experience. Springer, 2005, pp. 48-60.
-
(2005)
Information Security Practice and Experience
, pp. 48-60
-
-
Tsang, P.P.1
Wei, V.K.2
-
22
-
-
38049040255
-
Enhancing grid security using trusted virtualization
-
Springer-Verlag, Berlin-Heidelberg
-
H. Lhr, H. V. Ramasamy, A. reza Sadeghi, S. Schulz, M. Schunter, and C. Stble, "Enhancing grid security using trusted virtualization," in 2nd Workshop on Advances in Trusted Computing. Springer-Verlag, Berlin-Heidelberg, 2006, pp. 372-384.
-
(2006)
2nd Workshop on Advances in Trusted Computing
, pp. 372-384
-
-
Lhr, H.1
Ramasamy, H.V.2
Reza Sadeghi, A.3
Schulz, S.4
Schunter, M.5
Stble, C.6
-
23
-
-
36248939688
-
Trusted ticket systems and applications
-
Springer
-
N. Kuntze and A. U. Schmidt, "Trusted ticket systems and applications," in New Approaches for Security, Privacy and Trust in Complex Systems, vol. 232. Springer, 2007, pp. 49-60.
-
(2007)
New Approaches for Security, Privacy and Trust in Complex Systems
, vol.232
, pp. 49-60
-
-
Kuntze, N.1
Schmidt, A.U.2
-
24
-
-
77953490662
-
A secure modular mobile agent system
-
ACM Press
-
A. Pridgen, A. Pridgen, C. Julien, and C. Julien, "A secure modular mobile agent system," in International Workshop on Software. ACM Press, 2006, pp. 67-74.
-
(2006)
International Workshop on Software
, pp. 67-74
-
-
Pridgen, A.1
Pridgen, A.2
Julien, C.3
Julien, C.4
-
25
-
-
78649309769
-
Offline untrusted storage with immediate detection of forking and replay attacks
-
ACM
-
M. van Dijk, J. Rhodes, L. F. G. Sarmenta, and S. De-vadas, "Offline untrusted storage with immediate detection of forking and replay attacks," in ACM workshop on Scalable trusted computing. ACM, 2007, pp. 41-48.
-
(2007)
ACM Workshop on Scalable Trusted Computing
, pp. 41-48
-
-
Van Dijk, M.1
Rhodes, J.2
Sarmenta, L.F.G.3
De-Vadas, S.4
-
26
-
-
33749405352
-
Trusted computing: Providing security for peer-to-peer networks
-
IEEE Computer Society
-
S. Balfe, A. D. Lakhani, and K. G. Paterson, "Trusted computing: Providing security for peer-to-peer networks," in Fifth IEEE International Conference on Peer-to-Peer Computing. IEEE Computer Society, 2005, pp. 117-124.
-
(2005)
Fifth IEEE International Conference on Peer-to-peer Computing
, pp. 117-124
-
-
Balfe, S.1
Lakhani, A.D.2
Paterson, K.G.3
-
27
-
-
14844291531
-
Attestation-based policy enforcement for remote access
-
ACM Press
-
R. Sailer, T. Jaeger, X. Zhang, and L. V. Doorn, "Attestation-based policy enforcement for remote access," in 11th ACM conference on Computer and Communications Security. ACM Press, 2004, pp. 308-317.
-
(2004)
11th ACM Conference on Computer and Communications Security
, pp. 308-317
-
-
Sailer, R.1
Jaeger, T.2
Zhang, X.3
Doorn, L.V.4
-
28
-
-
84910156435
-
VTPM virtualizing the trusted platform module
-
S. Berger, R. Cceres, K. A. Goldman, R. Perez, R. Sailer, and L. Doorn, "vTPM virtualizing the trusted platform module," in 15th Usenix Security Symposium, 2006, pp. 305-320.
-
(2006)
15th Usenix Security Symposium
, pp. 305-320
-
-
Berger, S.1
Cceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Doorn, L.6
-
29
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
ACM Press
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, "Terra: a virtual machine-based platform for trusted computing," in 19th Symposium on Operating System Principles. ACM Press, 2003, pp. 193-206.
-
(2003)
19th Symposium on Operating System Principles
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
30
-
-
63149115885
-
Kernel design for isolation and assurance of physical memory
-
New York, NY, USA: ACM
-
D. Elkaduwe, P. Derrin, and K. Elphinstone, "Kernel design for isolation and assurance of physical memory," in IIES '08: Proceedings of the 1st workshop on Isolation and integration in embedded systems. New York, NY, USA: ACM, 2008, pp. 35-40.
-
(2008)
IIES '08: Proceedings of the 1st Workshop on Isolation and Integration in Embedded Systems
, pp. 35-40
-
-
Elkaduwe, D.1
Derrin, P.2
Elphinstone, K.3
-
31
-
-
77952256837
-
Towards trustworthy computing systems: Taking microkernels to the next level
-
G. Heiser, K. Elphinstone, I. Kuz, G. Klein, and S. M. Petters, "Towards trustworthy computing systems: taking microkernels to the next level," SIGOPS Oper. Syst. Rev., vol. 41, no. 4, pp. 3-11, 2007.
-
(2007)
SIGOPS Oper. Syst. Rev.
, vol.41
, Issue.4
, pp. 3-11
-
-
Heiser, G.1
Elphinstone, K.2
Kuz, I.3
Klein, G.4
Petters, S.M.5
-
32
-
-
58349104116
-
Secure storage using a sealing proxy
-
New York, NY, USA: ACM
-
E. Cesena, G. Ramunno, and D. Vernizzi, "Secure storage using a sealing proxy," in Proceedings of the 1st European Workshop on System Security. New York, NY, USA: ACM, 2008, pp. 27-34.
-
(2008)
Proceedings of the 1st European Workshop on System Security
, pp. 27-34
-
-
Cesena, E.1
Ramunno, G.2
Vernizzi, D.3
-
34
-
-
0003400255
-
Integrity considerations for secure computer systems
-
04
-
K. J. Biba, "Integrity considerations for secure computer systems," MITRE Corp., Tech. Rep., 04 1977.
-
(1977)
MITRE Corp., Tech. Rep.
-
-
Biba, K.J.1
-
35
-
-
0033690785
-
Lomac: Low water-mark integrity protection for cots environments
-
IEEE Computer Society
-
T. Fraser, "Lomac: Low water-mark integrity protection for cots environments," in IEEE Symposium on Security and Privacy. IEEE Computer Society, 2000, pp. 230-245.
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 230-245
-
-
Fraser, T.1
-
36
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
IEEE Computer Society Press
-
D. D. Clark and D. R. Wilson, "A Comparison of Commercial and Military Computer Security Policies," in IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 1987, pp. 184-194.
-
(1987)
IEEE Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
37
-
-
27544477855
-
Bind: A fine-grained attestation service for secure distributed systems
-
E. Shi and A. Perrig, "Bind: A fine-grained attestation service for secure distributed systems," in IEEE Symposium on Security and Privacy, 2005, pp. 154-168.
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 154-168
-
-
Shi, E.1
Perrig, A.2
-
38
-
-
57349085064
-
Model-based behavioral attestation
-
New York, NY, USA: ACM
-
M. Alam, X. Zhang, M. Nauman, T. Ali, and J.-P. Seifert, "Model-based behavioral attestation," in SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies. New York, NY, USA: ACM, 2008, pp. 175-184.
-
(2008)
SACMAT '08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 175-184
-
-
Alam, M.1
Zhang, X.2
Nauman, M.3
Ali, T.4
Seifert, J.-P.5
-
39
-
-
34547196300
-
A protocol for property-based attestation
-
New York, NY, USA: ACM
-
L. Chen, R. Landfermann, H. Löhr, M. Rohe, A.-R. Sadeghi, and C. Stüble, "A protocol for property-based attestation," in STC '06: Proceedings of the first ACM workshop on Scalable trusted computing. New York, NY, USA: ACM, 2006, pp. 7-16.
-
(2006)
STC '06: Proceedings of the First ACM Workshop on Scalable Trusted Computing
, pp. 7-16
-
-
Chen, L.1
Landfermann, R.2
Löhr, H.3
Rohe, M.4
Sadeghi, A.-R.5
Stüble, C.6
-
40
-
-
34547205548
-
Linking remote attestation to secure tunnel endpoints
-
New York, NY, USA: ACM
-
K. Goldman, R. Perez, and R. Sailer, "Linking remote attestation to secure tunnel endpoints," in Proceedings of the first ACM workshop on Scalable trusted computing. New York, NY, USA: ACM, 2006, pp. 21-24.
-
(2006)
Proceedings of the First ACM Workshop on Scalable Trusted Computing
, pp. 21-24
-
-
Goldman, K.1
Perez, R.2
Sailer, R.3
-
41
-
-
33748062337
-
Prima: Policy-reduced integrity measurement architecture
-
ACM Press
-
U. Shankar, T. Jaeger, T. Jaeger, R. Sailer, and R. Sailer, "Prima: policy-reduced integrity measurement architecture," in 11th Symposium on Access Control Models and Technologies. ACM Press, 2006.
-
(2006)
11th Symposium on Access Control Models and Technologies
-
-
Shankar, U.1
Jaeger, T.2
Jaeger, T.3
Sailer, R.4
Sailer, R.5
-
42
-
-
84885617227
-
Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
-
Oct.
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla, "Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms," in ACM Symposium on Operating Systems Principles, Oct. 2005, pp. 1-15.
-
(2005)
ACM Symposium on Operating Systems Principles
, pp. 1-15
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
Van Doorn, L.5
Khosla, P.6
-
43
-
-
84894902184
-
Turtles all the way down: Research challenges in user-based attestation
-
Berkeley, CA, USA: USENIX Association
-
J. M. McCune, A. Perrig, A. Seshadri, and L. van Doorn, "Turtles all the way down: research challenges in user-based attestation," in HOTSEC'07: Proceedings of the 2nd USENIX workshop on Hot topics in security. Berkeley, CA, USA: USENIX Association, 2007, pp. 1-5.
-
(2007)
HOTSEC'07: Proceedings of the 2nd USENIX Workshop on Hot Topics in Security
, pp. 1-5
-
-
McCune, J.M.1
Perrig, A.2
Seshadri, A.3
Van Doorn, L.4
-
44
-
-
70349256468
-
Improving the scalability of platform attestation
-
New York, NY, USA: ACM
-
F. Stumpf, A. Fuchs, S. Katzenbeisser, and C. Eckert, "Improving the scalability of platform attestation," in STC '08: Proceedings of the 3rd ACM workshop on Scalable trusted computing. New York, NY, USA: ACM, 2008, pp. 1-10.
-
(2008)
STC '08: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing
, pp. 1-10
-
-
Stumpf, F.1
Fuchs, A.2
Katzenbeisser, S.3
Eckert, C.4
-
45
-
-
11244267013
-
-
Secaucus, NJ, USA: SpringerVerlag New York, Inc.
-
D. Hankerson, A. J. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography. Secaucus, NJ, USA: SpringerVerlag New York, Inc., 2003.
-
(2003)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.J.2
Vanstone, S.3
|