-
2
-
-
78650185193
-
Implementing an application-specific credential platform using late-launched mobile trusted module
-
Bugiel, S., Ekberg, J.: Implementing an application-specific credential platform using late-launched mobile trusted module. In: Proc. ACM STC (2010)
-
Proc. ACM STC (2010)
-
-
Bugiel, S.1
Ekberg, J.2
-
3
-
-
80052985363
-
DriverGuard: A fine-grained protection on I/O flows
-
Atluri, V., Diaz, C. (eds.) ESORICS 2011 Springer, Heidelberg
-
Cheng, Y., Ding, X., Deng, R.H.: DriverGuard: A fine-grained protection on I/O flows. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 227-244. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6879
, pp. 227-244
-
-
Cheng, Y.1
Ding, X.2
Deng, R.H.3
-
5
-
-
74049088125
-
Truwallet: Trustworthy and migratable wallet-based web authentication
-
Gajek, S., Löhr, H., Sadeghi, A., Winandy, M.: Truwallet: trustworthy and migratable wallet-based web authentication. In: Proc. ACM STC (2009)
-
Proc. ACM STC (2009)
-
-
Gajek, S.1
Löhr, H.2
Sadeghi, A.3
Winandy, M.4
-
6
-
-
84875683130
-
Inktag: Secure applications on an untrusted operating system
-
Hofmann, O.S., Kim, S., Dunn, A.M., Lee, M.Z., Witchel, E.: Inktag: secure applications on an untrusted operating system. In: Proc. ASPLOS (2013)
-
Proc. ASPLOS (2013)
-
-
Hofmann, O.S.1
Kim, S.2
Dunn, A.M.3
Lee, M.Z.4
Witchel, E.5
-
7
-
-
84884631882
-
-
HP
-
HP. Enterprise Secure Key Manager, http://h18006.www1.hp.com/products/ quickspecs/13978-div/13978-div.PDF
-
Enterprise Secure Key Manager
-
-
-
8
-
-
84884635295
-
-
IBM
-
IBM. Tivoli Key Lifecycle Manager, http://www-01.ibm.com/software/tivoli/ products/key-lifecycle-mgr
-
Tivoli Key Lifecycle Manager
-
-
-
11
-
-
79960349207
-
-
Matrosov, A., Rodionov, E., Harley, D., Malch, J.: Stuxnet Under the Microscope, http://www.eset.com/us/resources/white-papers/Stuxnet-Under-the- Microscope.pdf
-
Stuxnet under the Microscope
-
-
Matrosov, A.1
Rodionov, E.2
Harley, D.3
Malch, J.4
-
12
-
-
77955186544
-
TrustVisor: Efficient TCB reduction and attestation
-
McCune, J., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V., Perrig, A.: TrustVisor: Efficient TCB reduction and attestation. In: Proc. IEEE Symp. on Security and Privacy (2010)
-
Proc. IEEE Symp. On Security and Privacy (2010)
-
-
McCune, J.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
13
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
McCune, J.M., Parno, B., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: An execution infrastructure for TCB minimization. In: Proc. EuroSys (2008)
-
Proc. EuroSys (2008)
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
15
-
-
84884601834
-
-
Oracle
-
Oracle. Oracle Key Manager, http://www.oracle.com/us/products/servers- storage/storage/tape-storage/034335.pdf
-
Oracle Key Manager
-
-
-
16
-
-
80051981604
-
Memoir: Practical state continuity for protected modules
-
Parno, B., Lorch, J.R., Douceur, J.R., Mickens, J., McCune, J.M.: Memoir: Practical state continuity for protected modules. In: Proc. IEEE Symp. on Security and Privacy (2011)
-
Proc. IEEE Symp. On Security and Privacy (2011)
-
-
Parno, B.1
Lorch, J.R.2
Douceur, J.R.3
Mickens, J.4
McCune, J.M.5
-
17
-
-
84884607798
-
-
RSA
-
RSA. RSA Data Protection Manager, http://www.emc.com/security/rsa-data- protection-manager.html
-
RSA Data Protection Manager
-
-
-
18
-
-
84884625136
-
-
SafeNet
-
SafeNet. SafeNet hardware security modules, http://www.safenet-inc.com/ products/data-protection/hardware-security-modules-hsms/
-
SafeNet Hardware Security Modules
-
-
-
19
-
-
84884624138
-
-
StrongAuth
-
StrongAuth. StrongKey SKMS, http://www.strongkey.org
-
StrongKey SKMS
-
-
-
20
-
-
84884660205
-
-
Thales
-
Thales. Thales hardware security modules, http://www.thales-esecurity. com/en/Products/Hardware%20Security%20Modules.aspx
-
Thales Hardware Security Modules
-
-
-
21
-
-
70749106620
-
-
Trusted Computing Group version 1.2
-
Trusted Computing Group. TPM specification version 1.2 (2009)
-
(2009)
TPM Specification
-
-
-
23
-
-
84866640975
-
-
VASCO
-
VASCO. Diginotar reports security incident (2011), http://www.vasco.com/ company/about-vasco/press-room/news-archive/2011/news-diginotar-reports- security-incident.aspx
-
(2011)
Diginotar Reports Security Incident
-
-
-
24
-
-
82655179240
-
Cloudvisor: Retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization
-
Zhang, F., Chen, J., Chen, H., Zang, B.: Cloudvisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In: Proc. ACM SOSP (2011)
-
Proc. ACM SOSP (2011)
-
-
Zhang, F.1
Chen, J.2
Chen, H.3
Zang, B.4
-
25
-
-
84878350874
-
Building verifiable trusted path on commodity x86 computers
-
Zhou, Z., Gligor, V., Newsome, J., McCune, J.: Building verifiable trusted path on commodity x86 computers. In: Proc. IEEE Symp. on Security and Privacy (2012)
-
Proc. IEEE Symp. On Security and Privacy (2012)
-
-
Zhou, Z.1
Gligor, V.2
Newsome, J.3
McCune, J.4
|