-
1
-
-
54049153566
-
TVDc: Managing Security in the Trusted Virtual Datacenter
-
Berger, S, Cáceres, R, Pendarakis, D, Sailer, R & Valdez, E 2008, 'TVDc: Managing Security in the Trusted Virtual Datacenter', SIGOPS Oper. Syst.
-
(2008)
SIGOPS Oper. Syst.
-
-
Berger, S.1
Cáceres, R.2
Pendarakis, D.3
Sailer, R.4
Valdez, E.5
-
3
-
-
84872940117
-
-
2011, The Common Criteria, http://www.commoncriteriaportal.org/.
-
(2011)
The Common Criteria
-
-
-
4
-
-
57449087555
-
-
Prentice Hall PTR, Upper Saddle River, NJ, USA
-
Chisnall, D 2007, The Definitive Guide to the Xen Hypervisor, Prentice Hall PTR, Upper Saddle River, NJ, USA.
-
(2007)
The Definitive Guide to the Xen Hypervisor
-
-
Chisnall, D.1
-
7
-
-
84872938135
-
-
CSA
-
CSA 2009, Cloud Security Alliance, http://www.cloudsecurityalliance.org/.
-
(2009)
-
-
-
8
-
-
84864878546
-
Trusted Computing Challenges
-
ACM, New York, NY, USA
-
Doorn, LV 2007, 'Trusted Computing Challenges', Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, ACM, New York, NY, USA.
-
(2007)
Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing
-
-
Doorn, L.V.1
-
9
-
-
4444318660
-
-
ACM Press
-
Garfinkel, T, Pfaff, B, Chow, J, Rosenblum, M & Boneh, D 2003, 'Terra: a Virtual Machine-based Platform for Trusted Computing', ACM Press.
-
(2003)
Terra: A Virtual Machine-based Platform for Trusted Computing
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
10
-
-
79952612270
-
Beyond Secure Channels
-
ACM, New York, NY, USA
-
Gasmi, Y, Sadeghi, A-R, Stewin, P, Unger, M & Asokan, N 2007, 'Beyond Secure Channels', Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, ACM, New York, NY, USA.
-
(2007)
Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing
-
-
Gasmi, Y.1
Sadeghi, A.-R.2
Stewin, P.3
Unger, M.4
Asokan, N.5
-
11
-
-
34250717227
-
Trusted Virtual Domains: Toward Secure Distributed Services
-
IEEE Press
-
Griffin, JL, Jaeger, T, Perez, R, Sailer, R, Doorn, LV & Ca'ceres, R 2005, 'Trusted Virtual Domains: Toward Secure Distributed Services', In Proc. of the First Workshop on Hot Topics in System Dependability, IEEE Press.
-
(2005)
Proc. of the First Workshop on Hot Topics in System Dependability
-
-
Griffin, J.L.1
Jaeger, T.2
Perez, R.3
Sailer, R.4
Doorn, L.V.5
Ca'ceres, R.6
-
13
-
-
84864879151
-
An Effective Approach for Remote Attestation in Trusted Computing
-
Academy Publisher, FIN-90571, OULU, FINLAND
-
Huang, X & Peng, Y 2009, 'An Effective Approach for Remote Attestation in Trusted Computing', WISA 2009 : Proceedings of the 2nd International Symposium on Web Information Systems and Applications, Academy Publisher, FIN-90571, OULU, FINLAND.
-
(2009)
WISA 2009: Proceedings of the 2nd International Symposium on Web Information Systems and Applications
-
-
Huang, X.1
Peng, Y.2
-
14
-
-
1442292341
-
-
IKE Internet Engineering Task Force (IETF), RFC 4306
-
IKE 2005, 'Internet Key Exchange (IKEv2) Protocol', Internet Engineering Task Force (IETF), RFC 4306.
-
(2005)
Internet Key Exchange (IKEv2) Protocol
-
-
-
17
-
-
38049026664
-
-
Kuhlmann, D, Landfermann, R, Ramasamy, HV, Schunter, M, Ramunno, G & Vernizzi, D 2006, 'An Open Trusted Computing Architecture - Secure Virtual Machines Enabling User-Defined Policy Enforcement', www.opentc.net.
-
(2006)
An Open Trusted Computing Architecture - Secure Virtual Machines Enabling User-Defined Policy Enforcement
-
-
Kuhlmann, D.1
Landfermann, R.2
Ramasamy, H.V.3
Schunter, M.4
Ramunno, G.5
Vernizzi, D.6
-
19
-
-
84872925640
-
-
Sepcial Report, viewed 2010
-
Linthicum, D, Knorr, E, Gruman, G, Scheier, RL, Beckman, M & Wayner, P 2009, Cloud Computing Deep Dive, Sepcial Report, viewed 2010, http://www.InfoWorld.com.
-
(2009)
Cloud Computing Deep Dive
-
-
Linthicum, D.1
Knorr, E.2
Gruman, G.3
Scheier, R.L.4
Beckman, M.5
Wayner, P.6
-
20
-
-
70849091604
-
An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments
-
Ormandy, T 2007, 'An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments', CanSecWest.
-
(2007)
CanSecWest
-
-
Ormandy, T.1
-
21
-
-
27244434460
-
Integrity Measurement Architecture
-
Sailer, R, Zhang, X, Jaeger, T & Doorn, LV 2004, 'Integrity Measurement Architecture', The Proceedings of the 13th USENIX Security Symposium, San Diego, California.
-
(2004)
The Proceedings of the 13th USENIX Security Symposium, San Diego, California
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Doorn, L.V.4
-
22
-
-
84929445167
-
Towards Trusted Cloud Computing
-
Santos, N, Gummadi, KP & Rodrigues, R 2009, 'Towards Trusted Cloud Computing', Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, USENIX Association, Berkeley, CA, San Diego, California.
-
(2009)
Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, USENIX Association, Berkeley, CA, San Diego, California
-
-
Santos, N.1
Gummadi, K.P.2
Rodrigues, R.3
-
25
-
-
84872967129
-
-
TCG
-
TCG 2003, Trusted Computing Group, http://www.trustedcomputinggroup.org/.
-
(2003)
-
-
-
27
-
-
77952371831
-
-
TPM 2007, TPM Main Specification, http://www.trustedcomputinggroup.org/ resources/tpm-main-specification
-
(2007)
TPM Main Specification
-
-
-
28
-
-
84872909017
-
-
'Trusted Multi-tenant Infrastructure (TMI)' 2010, Trusted Computing Group (TCG), http://www.trustedcomputinggroup.org/developers/trusted-multitenant- infrastructure.
-
(2010)
Trusted Multi-tenant Infrastructure (TMI)
-
-
-
29
-
-
84872973939
-
-
VMware Inc.
-
VMware 2010, VMware Inc., Virtualization Solutions, http://www.vmware. com/virtualization/.
-
(2010)
Virtualization Solutions
-
-
|