-
2
-
-
84864877472
-
Security considerations for virtual platform provisioning
-
UK. The Institute of Cybernetics at the Tallinn University of Technology, Academic Publishing Limited
-
Aslam, M. and Gehrmann, C. (2011). Security Considerations for Virtual Platform Provisioning. In ECIW '11: Proceedings of the 10th European Conference on Information Warfare and Security, pages 283-290, UK. The Institute of Cybernetics at the Tallinn University of Technology, Academic Publishing Limited.
-
(2011)
ECIW '11: Proceedings of the 10th European Conference on Information Warfare and Security
, pp. 283-290
-
-
Aslam, M.1
Gehrmann, C.2
-
3
-
-
84910156435
-
Vtpm: Virtualizing the trusted platform module
-
Berkeley, CA, USA. USENIX Association
-
Berger, S., Cáceres, R., Goldman, K. A., Perez, R., Sailer, R., and van Doorn, L. (2006). vTPM: Virtualizing the Trusted Platform Module. In USENIX-SS'06: Proceedings of the 15th Conference on USENIX Security Symposium, Berkeley, CA, USA. USENIX Association.
-
(2006)
USENIX-SS'06: Proceedings of the 15th Conference on USENIX Security Symposium
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
6
-
-
84864868892
-
-
Cloud Computing and Security
-
Cloud Computing and Security (2010). Cloud Computing and Security - A Natural Match. http://www.trustedcomputinggroup.org/resources/cloud-computing- and-security-a-natural-match.
-
(2010)
Cloud Computing and Security - A Natural Match
-
-
-
9
-
-
79952612270
-
Beyond secure channels
-
New York, NY, USA. ACM
-
Gasmi, Y., Sadeghi, A.-R., Stewin, P., Unger, M., and Asokan, N. (2007). Beyond Secure Channels. In STC '07: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, pages 30-40, New York, NY, USA. ACM.
-
(2007)
STC '07: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing
, pp. 30-40
-
-
Gasmi, Y.1
Sadeghi, A.-R.2
Stewin, P.3
Unger, M.4
Asokan, N.5
-
10
-
-
70349659108
-
Semantic remote attestation - A virtual machine directed approach to trusted computing
-
Haldar, V., Chandra, D., and Franz, M. (2004). Semantic Remote Attestation - A Virtual Machine directed approach to Trusted Computing. In USENIX Virtual Machine Research and Technology Symposium, pages 29-41.
-
(2004)
USENIX Virtual Machine Research and Technology Symposium
, pp. 29-41
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
11
-
-
84864879151
-
An effective approach for remote attestation in trusted computing
-
FIN-90571, OULU, FINLAND. Academy Publisher
-
Huang, X. and Peng, Y. (2009). An Effective Approach for Remote Attestation in Trusted Computing. In WISA 2009: Proceedings of the 2nd International Symposium on Web Information Systems and Applications, pages 80-83, FIN-90571, OULU, FINLAND. Academy Publisher.
-
(2009)
WISA 2009: Proceedings of the 2nd International Symposium on Web Information Systems and Applications
, pp. 80-83
-
-
Huang, X.1
Peng, Y.2
-
15
-
-
38049026664
-
-
www.opentc.net
-
Landfermann, R., Kuhlmann, D., Kuhlmann, D., L, R., Ramasamy, H. V., Ramasamy, H. V., Schunter, M., Schunter, M., Ramunno, G., Ramunno, G., Vernizzi, D., and Vernizzi, D. (2006). D.: An Open Trusted Computing Architecture - Secure Virtual Machines Enabling User-defined Policy Enforcement. www.opentc.net.
-
(2006)
D.: An Open Trusted Computing Architecture - Secure Virtual Machines Enabling User-defined Policy Enforcement
-
-
Landfermann, R.1
Kuhlmann, D.2
Kuhlmann, D.L.R.3
Ramasamy, H.V.4
Ramasamy, H.V.5
Schunter, M.6
Schunter, M.7
Ramunno, G.8
Ramunno, G.9
Vernizzi, D.10
Vernizzi, D.11
-
16
-
-
50649096920
-
An empirical study into the security exposure to hosts of hostile virtualized environments
-
Ormandy, T. (2007). An empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments. In Can Sec West.
-
(2007)
Can Sec West
-
-
Ormandy, T.1
-
17
-
-
80052161321
-
Lucy in the sky without diamonds: Stealing confidential data in the cloud
-
Rocha, F. and Correia, M. (2011). Lucy in the sky without diamonds: Stealing confidential data in the cloud. Dependable Systems and Networks Workshops, 0:129-134.
-
(2011)
Dependable Systems and Networks Workshops
, vol.0
, pp. 129-134
-
-
Rocha, F.1
Correia, M.2
-
18
-
-
85084162270
-
Design and implementation of a tcg-based integrity measurement architecture
-
SSYM'04 Berkeley, CA, USA. USENIX Association
-
Sailer, R., Zhang, X., Jaeger, T., and van Doorn, L. (2004). Design and implementation of a tcg-based integrity measurement architecture. In Proceedings of the 13th conference on USENIX Security Symposium - Volume 13, SSYM'04, pages 16-16, Berkeley, CA, USA. USENIX Association.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium
, vol.13
, pp. 16-16
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
20
-
-
21644486314
-
-
TCG Architecture Overview
-
TCG Architecture Overview (2007). TCG Specification Architecture Overview. http://www.trustedcomputinggroup.org/resources.
-
(2007)
TCG Specification Architecture Overview
-
-
-
22
-
-
85162505621
-
-
TMI
-
TMI (2010). TCG Trusted Multi-Tenant Infrastructure. http://www. trustedcomputinggroup.org/developers/tr-usted-multitenant-infrastructure.
-
(2010)
TCG Trusted Multi-tenant Infrastructure
-
-
-
26
-
-
79751493181
-
Locking the sky: A survey on iaas cloud security
-
Vaquero, L. M., Rodero-Merino, L., and Morán, D. (2011). Locking the sky: a survey on iaas cloud security. Computing, 91:93-118.
-
(2011)
Computing
, vol.91
, pp. 93-118
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Morán, D.3
|