-
1
-
-
84893554917
-
-
Retrieved July 23, 2015, from
-
Amazon Web Services. 2013. AWS CloudHSM Getting Started Guide. Retrieved July 23, 2015, from http://aws.amazon.com/cloudhsm/.
-
(2013)
AWS CloudHSM Getting Started Guide
-
-
-
3
-
-
0026812740
-
Scheduler activations: Effective kernel support for the user-level management of threads
-
Thomas E. Anderson, Brian N. Bershad, Edward D. Lazowska, and Henry M. Levy. 1992. Scheduler activations: Effective kernel support for the user-level management of threads. ACM Transactions on Computer Systems 10, 53-79.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, pp. 53-79
-
-
Anderson, T.E.1
Bershad, B.N.2
Lazowska, E.D.3
Levy, H.M.4
-
14
-
-
84940972980
-
-
Retrieved July 23, 2015, from
-
Cloud Security Alliance. 2013. Government Access to Information Survey. Retrieved July 23, 2015, from https://cloudsecurityalliance.org/research/surveys/#-nsa-prism.
-
(2013)
Government Access to Information Survey
-
-
-
19
-
-
84888235428
-
U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program
-
June 6, 2013
-
Barton Gellman and Laura Poitras. 2013. U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program. Washington Post, June 6, 2013.
-
(2013)
Washington Post
-
-
Gellman, B.1
Poitras, L.2
-
20
-
-
84891637210
-
NSA infiltrates links to yahoo, google data centers worldwide, snowden documents say
-
October 30, 2013
-
Barton Gellman and Ashkan Soltani. 2013. NSA infiltrates links to yahoo, google data centers worldwide, snowden documents say. Washington Post, October 30, 2013.
-
(2013)
Washington Post
-
-
Gellman, B.1
Soltani, A.2
-
22
-
-
84865518868
-
Homomorphic evaluation of the AES circuit
-
Advances in Cryptology - CRYPTO 2012 Springer
-
Craig Gentry, Shai Halevi, and Nigel P. Smart. 2012. Homomorphic evaluation of the AES circuit. In Advances in Cryptology - CRYPTO 2012. Lecture Notes in Computer Science, Vol. 7417. Springer, 850-867,
-
(2012)
Lecture Notes in Computer Science
, vol.7417
, pp. 850-867
-
-
Gentry, C.1
Halevi, S.2
Smart, N.P.3
-
27
-
-
70449395452
-
Performance and consistency improvements of hash tree based disk storage protection
-
Fangyong Hou, Nong Xiao, Fang Liu, Hongjun He, and Dawu Gu. 2009. Performance and consistency improvements of hash tree based disk storage protection. In Proceedings of the 2009 IEEE International Conference on Networking, Architecture, and Storage. 51-56.
-
(2009)
Proceedings of the 2009 IEEE International Conference on Networking, Architecture, and Storage
, pp. 51-56
-
-
Hou, F.1
Xiao, N.2
Liu, F.3
He, H.4
Gu, D.5
-
32
-
-
72249120603
-
seL4: Formal verification of an OS kernel
-
nd ACM Symposium on Operating Systems Principles. 207-220. DOI:http://dx.doi.org/10.1145/1629575.1629596
-
(2009)
nd ACM Symposium on Operating Systems Principles
, pp. 207-220
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
35
-
-
85077468673
-
MiniBox: A two-way sandbox for x86 native code
-
Yanlin Li, Jonathan M. McCune, James Newsome, Adrian Perrig, Brandon Baker, and Will Drewry. 2014. MiniBox: A two-way sandbox for x86 native code. In Proceedings of the 2014 USENIX Annual Technical Conference.
-
(2014)
Proceedings of the 2014 USENIX Annual Technical Conference
-
-
Li, Y.1
McCune, J.M.2
Newsome, J.3
Perrig, A.4
Baker, B.5
Drewry, W.6
-
41
-
-
77955186544
-
TrustVisor: Efficient TCB reduction and attestation
-
Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil Gligor, and Adrian Perrig. 2010. TrustVisor: Efficient TCB reduction and attestation. In Proceedings of the IEEE Symposium on Security and Privacy. 143-158. DOI:http://dx.doi.org/10.1109/SP.2010.17
-
(2010)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 143-158
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
45
-
-
84958802026
-
A digital signature based on a conventional encryption function
-
Advances in Cryptology - CRYPTO '87 Springer
-
Ralph Merkle. 1987. A digital signature based on a conventional encryption function. In Advances in Cryptology - CRYPTO '87. Lecture Notes in Computer Science, Vol. 293. Springer, 369-378.
-
(1987)
Lecture Notes in Computer Science
, vol.293
, pp. 369-378
-
-
Merkle, R.1
-
46
-
-
84940984657
-
Revelations of N.S.A. spying cost U.S. tech companies
-
March 21, 2014
-
Claire Cain Miller. 2014. Revelations of N.S.A. spying cost U.S. tech companies. New York Times, March 21, 2014.
-
(2014)
New York Times
-
-
Miller, C.C.1
-
48
-
-
80051981604
-
Memoir: Practical state continuity for protected modules
-
Bryan Parno, Jacob R. Lorch, John R. Douceur, James Mickens, and Jonathan M. McCune. 2011. Memoir: Practical state continuity for protected modules. In Proceedings of the IEEE Symposium on Security and Privacy. 379-394. DOI:http://dx.doi.org/10.1109/SP.2011.38
-
(2011)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 379-394
-
-
Parno, B.1
Lorch, J.R.2
Douceur, J.R.3
Mickens, J.4
McCune, J.M.5
-
49
-
-
84941002116
-
-
Retrieved July 24, 2015, from
-
Dan Plastina. 2015. Azure Key Vault - Making the Cloud Safer. Retrieved July 24, 2015, from http://blogs.technet.com/b/kv/archive/2015/01/08/azure-key-vault-making-the-cloud-safer.aspx.
-
(2015)
Azure Key Vault - Making the Cloud Safer
-
-
Plastina, D.1
-
51
-
-
0016082273
-
Formal requirements for virtualizable third generation architectures
-
Gerald J. Popek and Robert P. Goldberg. 1974. Formal requirements for virtualizable third generation architectures. Communications of the ACM 17, 7, 412-421. DOI:http://dx.doi.org/10.1145/361011.361073
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
, pp. 412-421
-
-
Popek, G.J.1
Goldberg, R.P.2
-
54
-
-
84864345731
-
-
Technical Report Microsoft Research
-
Himanshu Raj, David Robinson, Talha Bin Tariq, Paul England, Stefan Saroiu, and Alec Wolman. 2011. Credo: Trusted Computing for Guest VMs with a Commodity Hypervisor. Technical Report MSR-TR-2011-130. Microsoft Research.
-
(2011)
Credo: Trusted Computing for Guest VMs with a Commodity Hypervisor
-
-
Raj, H.1
Robinson, D.2
Tariq, T.B.3
England, P.4
Saroiu, S.5
Wolman, A.6
-
58
-
-
0033293553
-
Building a high-performance, programmable secure coprocessor
-
Sean W. Smith and Steve Weingart. 1999. Building a high-performance, programmable secure coprocessor. Computer Networks 31, 9, 831-860. http://dl.acm.org/citation.cfm?id=324119.324128
-
(1999)
Computer Networks
, vol.31
, Issue.9
, pp. 831-860
-
-
Smith, S.W.1
Weingart, S.2
-
60
-
-
84888805968
-
MrCrypt: Static analysis for secure cloud computations
-
Sai Deep Tetali, Mohsen Lesani, Rupak Majumdar, and Todd Millstein. 2013. MrCrypt: Static analysis for secure cloud computations. In Proceedings of the 2013 ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications. 271-286. DOI:http://dx.doi.org/10.1145/2509136.2509554
-
(2013)
Proceedings of the 2013 ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications
, pp. 271-286
-
-
Tetali, S.D.1
Lesani, M.2
Majumdar, R.3
Millstein, T.4
-
63
-
-
84900419680
-
Cooperation and security isolation of library OSes for multi-process applications
-
th European Conference on Computer Systems (EuroSys'14). Article No. 9.
-
(2014)
th European Conference on Computer Systems (EuroSys'14)
-
-
Tsai, C.-C.1
Arora, K.S.2
Bandi, N.3
Jain, B.4
Jannen, W.5
John, J.6
Kalodner, H.A.7
Kulkarni, V.8
Oliveira, D.9
Porter, D.E.10
-
67
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
th IEEE Symposium on Security and Privacy. 79-93.
-
(2009)
th IEEE Symposium on Security and Privacy
, pp. 79-93
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
|