-
3
-
-
0031269854
-
DisCO: Running commodity operating systems on scalable multiprocessors
-
Nov
-
E. Bugnion, S. Devine, K. Govil, and M. Rosenblum. Disco: Running Commodity Operating Systems on Scalable Multiprocessors. ACM Transactions on Computer Systems, 15(4), Nov. 1997.
-
(1997)
ACM Transactions on Computer Systems
, vol.15
, Issue.4
-
-
Bugnion, E.1
Devine, S.2
Govil, K.3
Rosenblum, M.4
-
5
-
-
84917215685
-
Linux: Fewer bugs than rivals
-
Dec
-
M. Delio. Linux: Fewer Bugs than Rivals. Wired Magazine, http://www.wired.com/ software/coolapps/news/2004/12/66022, Dec. 2004.
-
(2004)
Wired Magazine
-
-
Delio, M.1
-
6
-
-
0017517624
-
Certification of programs for secure information flow
-
Jul
-
D. Denning and P. Denning. Certification of Programs for Secure Information Flow. Communications of the ACM, 20(7), Jul. 1977.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
-
-
Denning, D.1
Denning, P.2
-
10
-
-
85072542009
-
A security retrofit of VM/370
-
B. Gold, R. Linde, R. Peeler, M. Schaefer, J. Scheid, and P. Ward. A Security Retrofit of VM/370. In AFIPS Proc., 1979 National Computer Conference, 1979.
-
(1979)
AFIPS Proc., 1979 National Computer Conference
-
-
Gold, B.1
Linde, R.2
Peeler, R.3
Schaefer, M.4
Scheid, J.5
Ward, P.6
-
12
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
Jul
-
J. Halderman, S. Schoen, N. Heninger, W. Clarkson, W. Paul, J. Calandrino, A. Feldman, J. Appelbaum, and E. Felten. Lest We Remember: Cold Boot Attacks on Encryption Keys. In Proc. of 17th USENIX Security Symposium, Jul. 2008.
-
(2008)
Proc. Of 17th USENIX Security Symposium
-
-
Halderman, J.1
Schoen, S.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.6
Feldman, A.7
Appelbaum, J.8
Felten, E.9
-
17
-
-
85076274560
-
An approach to identifying storage and timing channels
-
Aug
-
R. Kemmerer. An Approach to Identifying Storage and Timing Channels. In ACM Transactions on Computer Systems, 1(3), Aug. 1983.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
-
-
Kemmerer, R.1
-
23
-
-
33845953872
-
-
Jan
-
National Security Agency. Security-enhanced Linux. http://www.nsa.gov/selinux, Jan. 2008.
-
(2008)
Security-Enhanced Linux
-
-
-
24
-
-
34047117968
-
Cache missing for fun and profit
-
May
-
C. Percival. Cache Missing for Fun and Profit. In Proc. of BSDCan 2005, May 2005.
-
(2005)
Proc. Of BSDCan 2005
-
-
Percival, C.1
-
27
-
-
85076307305
-
-
Jan
-
Secunia. Xen 3.x – Vulnerability Report. http://secunia.com/product/15863/?task=statistics, Jan. 2009.
-
(2009)
Xen 3.X – Vulnerability Report
-
-
-
29
-
-
54749125032
-
-
Ver. 1.2, Rev. 94, June
-
Trusted Computing Group. Trusted Platform Module Main Specification. http://www.trustedcomputinggroup.org, Ver. 1.2, Rev. 94, June 2006.
-
(2006)
Trusted Platform Module Main Specification
-
-
-
34
-
-
68149177571
-
Criminals ‘May overwhelm the web
-
Jan
-
T. Weber. Criminals ‘May Overwhelm the Web’. BBC News, http://news.bbc.co.uk/1/hi/business/6298641.stm, Jan. 2007.
-
(2007)
BBC News
-
-
Weber, T.1
-
36
-
-
85076274078
-
-
Apr
-
XenSource, Inc. Xen Community. http://xen.xensource.com/, Apr. 2008.
-
(2008)
Xen Community
-
-
|