메뉴 건너뛰기




Volumn , Issue , 2005, Pages 115-142

An overview of NGSCB

Author keywords

Commercial OS; Complex device drivers; Computer viruses; Desktop operating system; Driver bugs; Email viruses; Network intrusions; NGSCB; Operating systems (computers); Program debugging; Security vulnerabilities; Software architecture

Indexed keywords

COMPLEX NETWORKS; COMPUTER DEBUGGING; COMPUTER NETWORKS; COMPUTER VIRUSES; ELECTRONIC MAIL; NETWORK SECURITY; PROGRAM DEBUGGING; QUALITY ASSURANCE; SECURITY OF DATA; SOFTWARE ARCHITECTURE; STANDARDS;

EID: 85013587012     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1049/PBPC006E_ch4     Document Type: Chapter
Times cited : (13)

References (47)
  • 4
    • 0020778471 scopus 로고
    • Scomp: A solution to the multilevel security problem
    • July
    • L. Fraim. Scomp: a solution to the multilevel security problem. IEEE Computer, 16:26-34, July 1983.
    • (1983) IEEE Computer , vol.16 , pp. 26-34
    • Fraim, L.1
  • 10
    • 85084161596 scopus 로고    scopus 로고
    • Analysis of the Intel Pentium’s ability to support a secure virtual machine monitor
    • The USENIX Association, Berkeley, CA
    • J. Robin and C. Irvine. Analysis of the Intel Pentium’s ability to support a secure virtual machine monitor. In Proceedings of the 9th USENIX Security Symposium (SECURITY-00), pp. 129-144. The USENIX Association, Berkeley, CA, 2000.
    • (2000) Proceedings of the 9th USENIX Security Symposium (SECURITY-00) , pp. 129-144
    • Robin, J.1    Irvine, C.2
  • 11
    • 0016082273 scopus 로고
    • Formal requirements for virtualizable third generation architectures
    • G. Popek and R. Goldberg. Formal requirements for virtualizable third generation architectures. Communications of the ACM, 17(7):412-421, 1974.
    • (1974) Communications of the ACM , vol.17 , Issue.7 , pp. 412-421
    • Popek, G.1    Goldberg, R.2
  • 20
    • 0003278940 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • Springer-Verlag, Berlin
    • M. Bellare and C. Namprempre. Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In Proceedings of the Advances in Cryptology - Asiacrypt’00, pp. 531-545. Springer-Verlag, Berlin, 2000.
    • (2000) Proceedings of the Advances in Cryptology - Asiacrypt’00 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 21
    • 84880901653 scopus 로고    scopus 로고
    • The order of encryption and authentication for protecting communication (or: How secure is SSL?)
    • Springer-Verlag, Berlin
    • H. Krawczyk. The order of encryption and authentication for protecting communication (or: how secure is SSL?). In Proceedings of Advances in Cryptology (Crypto 2001), pp. 310-331. Springer-Verlag, Berlin, 2001.
    • (2001) Proceedings of Advances in Cryptology (Crypto 2001) , pp. 310-331
    • Krawczyk, H.1
  • 23
    • 0018048246 scopus 로고
    • Using encryption and authentication in large networks of computers
    • R. Needham and M. Schroeder. Using encryption and authentication in large networks of computers. Communications of the ACM, 21:993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 24
    • 0027589399 scopus 로고
    • Fully-fledged two-way public key authentication and key management for low-cost terminals
    • M. Beller and Y. Yacobi. Fully-fledged two-way public key authentication and key management for low-cost terminals. Electronics Letters, 29:999-1001, 1993.
    • (1993) Electronics Letters , vol.29 , pp. 999-1001
    • Beller, M.1    Yacobi, Y.2
  • 38
    • 0004196480 scopus 로고
    • Ph.D. thesis, Carnegie Mellon University
    • B. Yee. Using Secure Coprocessors. Ph.D. thesis, Carnegie Mellon University, 1994.
    • (1994) Using Secure Coprocessors
    • Yee, B.1
  • 40
    • 0037547629 scopus 로고    scopus 로고
    • Trusting trusted hardware: Towards a formal model for programmable secure coprocessors
    • USENIX, Berkeley, CA
    • S. W. Smith and V. Austel. Trusting trusted hardware: towards a formal model for programmable secure coprocessors. In Proceedings of the Third USENIXWorkshop on Electronic Commerce, pp. 83-98. USENIX, Berkeley, CA, 1998.
    • (1998) Proceedings of the Third USENIXWorkshop on Electronic Commerce , pp. 83-98
    • Smith, S.W.1    Austel, V.2
  • 41
    • 0033293553 scopus 로고    scopus 로고
    • Building a high-performance, programmable secure coprocessor
    • April
    • S.W. Smith and S.Weingart. Building a high-performance, programmable secure coprocessor. Computer Networks, 31(8):831-860, April 1999.
    • (1999) Computer Networks , vol.31 , Issue.8 , pp. 831-860
    • Smith, S.W.1    Weingart, S.2
  • 42
    • 0041745478 scopus 로고    scopus 로고
    • Signing and marking Active X controls
    • P. Johns. Signing and marking Active X controls. In Developer Network News, 1996. http://msdn.microsoft.com/library/default.asp?url =library/ends/dnaxctrl/html/msdn_signmark.asp
    • (1996) Developer Network News
    • Johns, P.1
  • 45
    • 85013567460 scopus 로고
    • File integrity in a disk-based multi-access system
    • C. A. R. Hoare and R. H. Perrot, eds, Academic Press
    • A. Fraser. File integrity in a disk-based multi-access system. In C. A. R. Hoare and R. H. Perrot, eds, Operating Systems Techniques. Academic Press, 1972.
    • (1972) Operating Systems Techniques
    • Fraser, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.