-
1
-
-
70349245595
-
An efficient implementation of trusted channels based on OpenSSL
-
ACM Press
-
ARMKNECHT, F., GASMI, Y., SADEGHI, A.-R., STEWIN, P., UNGER, M., RAMUNNO, G., AND VERNIZZI, D. An efficient implementation of trusted channels based on OpenSSL. In Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing (STC 2008) (2008), ACM Press, pp. 41-50.
-
(2008)
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing (STC 2008)
, pp. 41-50
-
-
ARMKNECHT, F.1
GASMI, Y.2
SADEGHI, A.-R.3
STEWIN, P.4
UNGER, M.5
RAMUNNO, G.6
VERNIZZI, D.7
-
2
-
-
33947130171
-
Lazy revocation in cryptographic file systems
-
December 13, San Francisco, California, USA (2005)
-
BACKES, M., CACHIN, C., AND OPREA, A. Lazy revocation in cryptographic file systems. In 3rd International IEEE Security in Storage Workshop (SISW 2005), December 13, 2005, San Francisco, California, USA (2005), pp. 1-11.
-
(2005)
3rd International IEEE Security in Storage Workshop (SISW 2005)
, pp. 1-11
-
-
BACKES, M.1
CACHIN, C.2
OPREA, A.3
-
3
-
-
33750228447
-
Secure key-updating for lazy revocation
-
Hamburg, Germany, September 18-20, Proceedings (2006), of Lecture Notes in Computer Science, Springer
-
BACKES, M., CACHIN, C., AND OPREA, A. Secure key-updating for lazy revocation. In Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings (2006), vol. 4189 of Lecture Notes in Computer Science, Springer, pp. 327-346.
-
(2006)
Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security
, vol.4189
, pp. 327-346
-
-
BACKES, M.1
CACHIN, C.2
OPREA, A.3
-
4
-
-
77957909604
-
Modeling the human and technological costs and benefits of USB memory stick security
-
J., AND
-
BEAUTEMENT, A., COLES, R., J., IOANNIDIS, C., MONAHAN, B., PYM, D., SASSE, A., AND WONHAM, M. Modeling the human and technological costs and benefits of USB memory stick security. In Workshop on the Economics of Information Security (WISE) (2008).
-
(2008)
Workshop on the Economics of Information Security (WISE)
-
-
BEAUTEMENT, A.1
COLES, R.2
IOANNIDIS, C.3
MONAHAN, B.4
PYM, D.5
SASSE, A.6
WONHAM, M.7
-
5
-
-
54049153566
-
TVDc: Managing security in the trusted virtual data-center
-
BERGER, S., CÁCERES, R., PENDARAKIS, D. E., SAILER, R., VALDEZ, E., PEREZ, R., SCHILDHAUER, W., AND SRINIVASAN, D. TVDc: Managing security in the trusted virtual data-center. Operating Systems Review 42, 1 (2008), 40-47.
-
(2008)
Operating Systems Review
, vol.42
, Issue.1
, pp. 40-47
-
-
BERGER, S.1
CÁCERES, R.2
PENDARAKIS, D. E.3
SAILER, R.4
VALDEZ, E.5
PEREZ, R.6
SCHILDHAUER, W.7
SRINIVASAN, D.8
-
9
-
-
70350642949
-
-
Tech. Rep. RC23792, IBM Research
-
BUSSANI, A., GRIFFIN, J. L., JANSEN, B., JULISCH, K., KARJOTH, G., MARUYAMA, H., NAKAMURA, M., PEREZ, R., SCHUNTER, M., TANNER, A., DOORN, L. V., HERREWEGHEN, E. A. V., WAIDNER, M., AND YOSHIHAMA, S. Trusted Virtual Domains: Secure foundations for business and IT services. Tech. Rep. RC23792, IBM Research, 2005.
-
(2005)
Trusted Virtual Domains: Secure foundations for business and IT services
-
-
BUSSANI, A.1
GRIFFIN, J. L.2
JANSEN, B.3
JULISCH, K.4
KARJOTH, G.5
MARUYAMA, H.6
NAKAMURA, M.7
PEREZ, R.8
SCHUNTER, M.9
TANNER, A.10
DOORN, L. V.11
HERREWEGHEN, E. A. V.12
WAIDNER, M.13
YOSHIHAMA, S.14
-
10
-
-
70350673437
-
Towards automated provisioning of secure virtualized networks
-
Alexandria, Virginia, USA, October 28-31, (2007), ACM
-
CABUK, S., DALTON, C. I., RAMASAMY, H. V., AND SCHUNTER, M. Towards automated provisioning of secure virtualized networks. In Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007 (2007), ACM, pp. 235-245.
-
(2007)
Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007
, pp. 235-245
-
-
CABUK, S.1
DALTON, C. I.2
RAMASAMY, H. V.3
SCHUNTER, M.4
-
11
-
-
68849092044
-
Integrity Protection for Revision Control
-
Paris-Rocquencourt, France, June 2-5, Proceedings (2009), Springer
-
CACHIN, C., AND GEISLER, M. Integrity Protection for Revision Control. In Applied Cryptography and Network Security: 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings (2009), Springer, p. 382.
-
(2009)
Applied Cryptography and Network Security: 7th International Conference, ACNS 2009
, pp. 382
-
-
CACHIN, C.1
GEISLER, M.2
-
12
-
-
4444361800
-
The design and implementation of a transparent cryptographic file system for unix
-
June 25-30, 2001, Boston, Massachusetts, USA USENIX
-
CATTANEO, G., CATUOGNO, L., SORBO, A. D., AND PERSIANO, P. The design and implementation of a transparent cryptographic file system for unix. In Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, June 25-30, 2001, Boston, Massachusetts, USA (2001), USENIX, pp. 199-212.
-
(2001)
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference
, pp. 199-212
-
-
CATTANEO, G.1
CATUOGNO, L.2
SORBO, A. D.3
PERSIANO, P.4
-
13
-
-
84885597052
-
Wayback: A user-level versioning file system for linux
-
CORNELL, B., DINDA, P., AND BUSTAMANTE, F. Wayback: A user-level versioning file system for linux. In Proceedings of Usenix Annual Technical Conference, FREENIX Track (2004), pp. 19-28.
-
(2004)
Proceedings of Usenix Annual Technical Conference, FREENIX Track
, pp. 19-28
-
-
CORNELL, B.1
DINDA, P.2
BUSTAMANTE, F.3
-
16
-
-
84867697860
-
-
EUROPEAN NETWORK AND INFORMATION SECURITY AGENCY (ENISA). June
-
EUROPEAN NETWORK AND INFORMATION SECURITY AGENCY (ENISA). Secure USB Flash Drives, June 2008. http://www.enisa.europa.eu/doc/pdf/publications/SecureUSBdrives_180608.pdf.
-
(2008)
Secure USB Flash Drives
-
-
-
17
-
-
62949173483
-
Endpoint security: managing USB-based removable devices with the advent of portable applications
-
(New York, NY, USA), ACM
-
FABIAN, M. Endpoint security: managing USB-based removable devices with the advent of portable applications. In InfoSecCD '07: Proceedings of the 4th annual conference on Information security curriculum development (New York, NY, USA, 2007), ACM, pp. 1-5.
-
(2007)
InfoSecCD '07: Proceedings of the 4th annual conference on Information security curriculum development
, pp. 1-5
-
-
FABIAN, M.1
-
18
-
-
77649247458
-
On the generic construction of identity-based signatures with additional properties
-
Shanghai, China, December 3-7, Proceedings (2006), of Lecture Notes in Computer Science, Springer
-
GALINDO, D., HERRANZ, J., AND KILTZ, E. On the generic construction of identity-based signatures with additional properties. In Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings (2006), vol. 4284 of Lecture Notes in Computer Science, Springer, pp. 178-193.
-
(2006)
Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security
, vol.4284
, pp. 178-193
-
-
GALINDO, D.1
HERRANZ, J.2
KILTZ, E.3
-
19
-
-
79952612270
-
Beyond secure channels
-
ACM Press
-
GASMI, Y., SADEGHI, A.-R., STEWIN, P., UNGER, M., AND ASOKAN, N. Beyond secure channels. In Proceedings of the 1st ACM Workshop on Scalable Trusted Computing (STC'07) (2007), ACM Press, pp. 30-40.
-
(2007)
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing (STC'07)
, pp. 30-40
-
-
GASMI, Y.1
SADEGHI, A.-R.2
STEWIN, P.3
UNGER, M.4
ASOKAN, N.5
-
20
-
-
70349233094
-
Flexible and secure enterprise rights management based on trusted virtual domains
-
Alexandria, VA, USA, October 31, (2008), ACM
-
GASMI, Y., SADEGHI, A.-R., STEWIN, P., UNGER, M., WINANDY, M., HUSSEIKI, R., AND STÜBLE, C. Flexible and secure enterprise rights management based on trusted virtual domains. In Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008 (2008), ACM, pp. 71-80.
-
(2008)
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008
, pp. 71-80
-
-
GASMI, Y.1
SADEGHI, A.-R.2
STEWIN, P.3
UNGER, M.4
WINANDY, M.5
HUSSEIKI, R.6
STÜBLE, C.7
-
21
-
-
34547205548
-
Linking remote attestation to secure tunnel endpoints
-
GOLDMAN, K., PEREZ, R., AND SAILER, R. Linking remote attestation to secure tunnel endpoints. In Proceedings of the First ACM Workshop on Scalable Trusted Computing (STC'06) (2006), pp. 21-24.
-
(2006)
Proceedings of the First ACM Workshop on Scalable Trusted Computing (STC'06)
, pp. 21-24
-
-
GOLDMAN, K.1
PEREZ, R.2
SAILER, R.3
-
22
-
-
34250717227
-
Trusted Virtual Domains: Toward secure distributed services
-
(June)
-
GRIFFIN, J. L., JAEGER, T., PEREZ, R., SAILER, R., VAN DOORN, L., AND CÁCERES, R. Trusted Virtual Domains: Toward secure distributed services. In Proceedings of the 1st IEEE Workshop on Hot Topics in System Dependability (HotDep'05) (June 2005).
-
(2005)
Proceedings of the 1st IEEE Workshop on Hot Topics in System Dependability (HotDep'05)
-
-
GRIFFIN, J. L.1
JAEGER, T.2
PEREZ, R.3
SAILER, R.4
VAN DOORN, L.5
CÁCERES, R.6
-
23
-
-
84947558992
-
A”paradoxical” indentity-based signature scheme resulting from zero-knowledge. In Advances in Cryptology - CRYPTO'88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings (1990)
-
of Lecture Notes in Computer Science, Springer
-
GUILLOU, L. C., AND QUISQUATER, J.-J. A”paradoxical” indentity-based signature scheme resulting from zero-knowledge. In Advances in Cryptology - CRYPTO'88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings (1990), vol. 403 of Lecture Notes in Computer Science, Springer, pp. 216-231.
-
, vol.403
, pp. 216-231
-
-
GUILLOU, L. C.1
QUISQUATER, J.-J.2
-
24
-
-
66149173689
-
Lest we remember: cold-boot attacks on encryption keys
-
HALDERMAN, J. A., SCHOEN, S. D., HENINGER, N., CLARK-SON, W., PAUL, W., CALANDRINO, J. A., FELDMAN, A. J., APPELBAUM, J., AND FELTEN, E. W. Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52, 5 (2009), 91-98.
-
(2009)
Commun. ACM
, vol.52
, Issue.5
, pp. 91-98
-
-
HALDERMAN, J. A.1
SCHOEN, S. D.2
HENINGER, N.3
CLARK-SON, W.4
PAUL, W.5
CALANDRINO, J. A.6
FELDMAN, A. J.7
APPELBAUM, J.8
FELTEN, E. W.9
-
25
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
March 31 April 2, Cathedral Hill Hotel, San Francisco, California, USA (2003), USENIX
-
KALLAHALLA, M., RIEDEL, E., SWAMINATHAN, R., WANG, Q., AND FU, K. Plutus: Scalable secure file sharing on untrusted storage. In Proceedings of the FAST'03 Conference on File and Storage Technologies, March 31 - April 2, 2003, Cathedral Hill Hotel, San Francisco, California, USA (2003), USENIX.
-
(2003)
Proceedings of the FAST'03 Conference on File and Storage Technologies
-
-
KALLAHALLA, M.1
RIEDEL, E.2
SWAMINATHAN, R.3
WANG, Q.4
FU, K.5
-
26
-
-
71749111380
-
Towards Multi-Layer Trusted Virtual Domains
-
(Tokyo, Japan, Nov), Japanese Ministry of Economy, Trade and Industry (METI)
-
KATSUNO, Y., KUDO, M., PEREZ, P., AND SAILER, R. Towards Multi-Layer Trusted Virtual Domains. In The 2nd Workshop on Advances in Trusted Computing (WATC 2006 Fall) (Tokyo, Japan, Nov. 2006), Japanese Ministry of Economy, Trade and Industry (METI).
-
(2006)
The 2nd Workshop on Advances in Trusted Computing (WATC 2006 Fall)
-
-
KATSUNO, Y.1
KUDO, M.2
PEREZ, P.3
SAILER, R.4
-
27
-
-
77952379905
-
Secure untrusted data repository (sundr)
-
LI, J., KROHN, M. N., MAZIÈRES, D., AND SHASHA, D. Secure untrusted data repository (sundr). In OSDI (2004), pp. 121-136.
-
(2004)
OSDI
, pp. 121-136
-
-
LI, J.1
KROHN, M. N.2
MAZIÈRES, D.3
SHASHA, D.4
-
28
-
-
84883516955
-
On micro-kernel construction
-
LIEDTKE, J. On micro-kernel construction. In SOSP (1995), pp. 237-250.
-
(1995)
SOSP
, pp. 237-250
-
-
LIEDTKE, J.1
-
29
-
-
70350637714
-
Trusted privacy domains - challenges for trusted computing in privacy-protecting information sharing
-
of Lecture Notes in Computer Science, Springer
-
LÖHR, H., SADEGHI, A.-R., VISHIK, C., AND WINANDY, M. Trusted privacy domains - challenges for trusted computing in privacy-protecting information sharing. In Information Security Practice and Experience, 5th International Conference, ISPEC 2009 (2009), vol. 5451 of Lecture Notes in Computer Science, Springer, pp. 396-407.
-
(2009)
Information Security Practice and Experience, 5th International Conference, ISPEC 2009
, vol.5451
, pp. 396-407
-
-
LÖHR, H.1
SADEGHI, A.-R.2
VISHIK, C.3
WINANDY, M.4
-
30
-
-
84897617999
-
-
MICROSFOT CORP
-
MICROSFOT CORP. Bitlocker drive encryption, 2006. http://technet.microsoft.com/en- us/windows/ aa905065.aspx.
-
(2006)
Bitlocker drive encryption
-
-
-
31
-
-
85084162599
-
A Versatile and User-Oriented Versioning File System
-
(San Francisco, CA, March/April), USENIX Association
-
MUNISWAMY-REDDY, K., WRIGHT, C. P., HIMMER, A., AND ZADOK, E. A Versatile and User-Oriented Versioning File System. In Proceedings of the Third USENIX Conference on File and Storage Technologies (FAST 2004) (San Francisco, CA, March/April 2004), USENIX Association, pp. 115-128.
-
(2004)
Proceedings of the Third USENIX Conference on File and Storage Technologies (FAST 2004)
, pp. 115-128
-
-
MUNISWAMY-REDDY, K.1
WRIGHT, C. P.2
HIMMER, A.3
ZADOK, E.4
-
32
-
-
33244493597
-
Toward securing untrusted storage without public-key operations
-
Fairfax, VA, USA, November 11, (2005), ACM
-
NAOR, D., SHENHAV, A., AND WOOL, A. Toward securing untrusted storage without public-key operations. In Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005 (2005), ACM, pp. 51-56.
-
(2005)
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005
, pp. 51-56
-
-
NAOR, D.1
SHENHAV, A.2
WOOL, A.3
-
33
-
-
44649188693
-
The impact of unavailability on the effectiveness of enterprise information security technologies
-
Tokyo, Japan, May 19-21, Proceedings (2008), of Lecture Notes in Computer Science, Springer
-
PARKIN, S. E., KASSAB, R. Y., AND VAN MOORSEL, A. P. A. The impact of unavailability on the effectiveness of enterprise information security technologies. In Service Availability, 5th International Service Availability Symposium, ISAS 2008, Tokyo, Japan, May 19-21, 2008, Proceedings (2008), vol. 5017 of Lecture Notes in Computer Science, Springer, pp. 43-58.
-
(2008)
Service Availability, 5th International Service Availability Symposium, ISAS 2008
, vol.5017
, pp. 43-58
-
-
PARKIN, S. E.1
KASSAB, R. Y.2
VAN MOORSEL, A. P. A.3
-
34
-
-
33244463191
-
Ext3cow: a time-shifting file system for regulatory compliance
-
PETERSON, Z., AND BURNS, R. Ext3cow: a time-shifting file system for regulatory compliance. ACM Transactions on Storage (TOS) 1, 2 (2005), 190-212.
-
(2005)
ACM Transactions on Storage (TOS)
, vol.1
, Issue.2
, pp. 190-212
-
-
PETERSON, Z.1
BURNS, R.2
-
35
-
-
85077267765
-
Design and implementation of verifiable audit trails for a versioning file system
-
USENIX Association Berkeley, CA, USA
-
PETERSON, Z., BURNS, R., ATENIESE, G., AND BONO, S. Design and implementation of verifiable audit trails for a versioning file system. In Proceedings of the 5th USENIX conference on File and Storage Technologies table of contents (2007), USENIX Association Berkeley, CA, USA, pp. 20-20.
-
(2007)
Proceedings of the 5th USENIX conference on File and Storage Technologies table of contents
, pp. 20-20
-
-
PETERSON, Z.1
BURNS, R.2
ATENIESE, G.3
BONO, S.4
-
36
-
-
85084164523
-
Access and integrity control in a public-access, high-assurance configuration management system
-
San Francisco, CA, USA, August 5-9, (2002), USENIX
-
SHAPIRO, J. S., AND VANDERBURGH, J. Access and integrity control in a public-access, high-assurance configuration management system. In Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA, August 5-9, 2002 (2002), USENIX, pp. 109-120.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 109-120
-
-
SHAPIRO, J. S.1
VANDERBURGH, J.2
-
37
-
-
85030405831
-
Concord: A secure mobile data authorization framework for regulatory compliance
-
November 9-14, San Diego, CA, USA (2008), USENIX Association
-
SINGARAJU, G., AND KANG, B. H. Concord: A secure mobile data authorization framework for regulatory compliance. In Proceedings of the 22nd Large Installation System Administration Conference, LISA 2008, November 9-14, 2008, San Diego, CA, USA (2008), USENIX Association, pp. 91-102.
-
(2008)
Proceedings of the 22nd Large Installation System Administration Conference, LISA 2008
, pp. 91-102
-
-
SINGARAJU, G.1
KANG, B. H.2
-
38
-
-
84885648386
-
Metadata Efficiency in Versioning File Systems
-
USENIX Association Berkeley, CA, USA
-
SOULES, C., GOODSON, G., STRUNK, J., AND GANGER, G. Metadata Efficiency in Versioning File Systems. In Proceedings of the 2nd USENIX Conference on File and Storage Technologies (2003), USENIX Association Berkeley, CA, USA, pp. 43-58.
-
(2003)
Proceedings of the 2nd USENIX Conference on File and Storage Technologies
, pp. 43-58
-
-
SOULES, C.1
GOODSON, G.2
STRUNK, J.3
GANGER, G.4
-
39
-
-
79953218276
-
A robust integrity reporting protocol for remote attestation
-
(Tokyo, December)
-
STUMPF, F., TAFRESCHI, O., RÖDER, P., AND ECKERT, C. A robust integrity reporting protocol for remote attestation. In 2nd Workshop on Advances in Trusted Computing (WATC'06 Fall) (Tokyo, December 2006).
-
(2006)
2nd Workshop on Advances in Trusted Computing (WATC'06 Fall)
-
-
STUMPF, F.1
TAFRESCHI, O.2
RÖDER, P.3
ECKERT, C.4
-
41
-
-
85036459874
-
Design, implementation, and evaluation of a Revision Control System
-
IEEE Computer Society Press Los Alamitos, CA, USA
-
TICHY, W. Design, implementation, and evaluation of a Revision Control System. In Proceedings of the 6th international conference on Software engineering (1982), IEEE Computer Society Press Los Alamitos, CA, USA, pp. 58-67.
-
(1982)
Proceedings of the 6th international conference on Software engineering
, pp. 58-67
-
-
TICHY, W.1
-
43
-
-
77952371831
-
-
TRUSTED COMPUTING GROUP. version 1.2 rev. 103, July
-
TRUSTED COMPUTING GROUP. TPM main specification, version 1.2 rev. 103, July 2007. https://www.trustedcomputinggroup.org.
-
(2007)
TPM main specification
-
-
-
44
-
-
77952122969
-
VPFS: Building a virtual private file system with a small trusted computing base
-
Glasgow, Scotland, UK, April 1-4, (2008), ACM
-
WEINHOLD, C., AND HÄRTIG, H. VPFS: Building a virtual private file system with a small trusted computing base. In Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008 (2008), ACM, pp. 81-93.
-
(2008)
Proceedings of the 2008 EuroSys Conference
, pp. 81-93
-
-
WEINHOLD, C.1
HÄRTIG, H.2
|