-
4
-
-
0020778471
-
Scomp: A solution to the multilevel security problem
-
July
-
L. Fraim. Scomp: a solution to the multilevel security problem. IEEE Computer, 16:26-34, July 1983.
-
(1983)
IEEE Computer
, vol.16
, pp. 26-34
-
-
Fraim, L.1
-
7
-
-
0013347999
-
-
Technical Report, IBM Research Division
-
B. Pfitzmann, J. Riordan, C. Stüble, M. Waidner, and A. Weber. The Perseus system architecture. Technical Report, IBM Research Division, 2001.
-
(2001)
The Perseus system architecture
-
-
Pfitzmann, B.1
Riordan, J.2
Stüble, C.3
Waidner, M.4
Weber, A.5
-
8
-
-
84883516225
-
Exokernel: An operating system architecture for application-level resource management
-
ACM Press, New York
-
D. Engler, M. F. Kaashoek, and J. O’Toole, Jr. Exokernel: an operating system architecture for application-level resource management. In Proceedings of the 15th Symposium on Operating Systems Principles (SOSP’95), Operating Systems Review, pp. 251-266. ACM Press, New York, 1995.
-
(1995)
Proceedings of the 15th Symposium on Operating Systems Principles (SOSP’95), Operating Systems Review
, pp. 251-266
-
-
Engler, D.1
Kaashoek, M.F.2
O’Toole Jr, J.3
-
9
-
-
78650880166
-
Flexible OS support and applications for trusted computing
-
USENIX, Berkeley, CA
-
T. Garfinkel, M. Rosenblum, and D. Boneh. Flexible OS support and applications for trusted computing. In Proceedings of the 9th USENIXWorkshop on Hot Topics in Operating Systems (HotOS-IX), pp. 145-150. USENIX, Berkeley, CA, 2003.
-
(2003)
Proceedings of the 9th USENIXWorkshop on Hot Topics in Operating Systems (HotOS-IX)
, pp. 145-150
-
-
Garfinkel, T.1
Rosenblum, M.2
Boneh, D.3
-
10
-
-
85084161596
-
Analysis of the Intel Pentium’s ability to support a secure virtual machine monitor
-
The USENIX Association, Berkeley, CA
-
J. Robin and C. Irvine. Analysis of the Intel Pentium’s ability to support a secure virtual machine monitor. In Proceedings of the 9th USENIX Security Symposium (SECURITY-00), pp. 129-144. The USENIX Association, Berkeley, CA, 2000.
-
(2000)
Proceedings of the 9th USENIX Security Symposium (SECURITY-00)
, pp. 129-144
-
-
Robin, J.1
Irvine, C.2
-
11
-
-
0016082273
-
Formal requirements for virtualizable third generation architectures
-
G. Popek and R. Goldberg. Formal requirements for virtualizable third generation architectures. Communications of the ACM, 17(7):412-421, 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
, pp. 412-421
-
-
Popek, G.1
Goldberg, R.2
-
12
-
-
21644433634
-
Xen and the art of virtualization
-
ACM Press, New York
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proceedings of the 19th Symposium on Operating Systems Principles (SOSP’03), pp. 164-177. ACM Press, New York, 2003.
-
(2003)
Proceedings of the 19th Symposium on Operating Systems Principles (SOSP’03)
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
13
-
-
33745803485
-
-
Technical Report MSR-TR-2003-20, Microsoft Research
-
Y. Chen, P. England, M. Peinado, and B. Willman. High assurance computing on open hardware architectures. Technical Report MSR-TR-2003-20, Microsoft Research, 2003.
-
(2003)
High assurance computing on open hardware architectures
-
-
Chen, Y.1
England, P.2
Peinado, M.3
Willman, B.4
-
14
-
-
34147097427
-
Virtual storage and virtual machine concepts
-
R. Parmelee, T. Peterson, C. Tillman, and D. Hatfield. Virtual storage and virtual machine concepts. IBM Systems Journal, 11(2):99-130, 1972.
-
(1972)
IBM Systems Journal
, vol.11
, Issue.2
, pp. 99-130
-
-
Parmelee, R.1
Peterson, T.2
Tillman, C.3
Hatfield, D.4
-
19
-
-
0026684778
-
Authentication in distributed systems: Theory and practice
-
November
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: theory and practice. ACM Transactions on Computer Systems, 10:265-310, November 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
20
-
-
0003278940
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
Springer-Verlag, Berlin
-
M. Bellare and C. Namprempre. Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In Proceedings of the Advances in Cryptology - Asiacrypt’00, pp. 531-545. Springer-Verlag, Berlin, 2000.
-
(2000)
Proceedings of the Advances in Cryptology - Asiacrypt’00
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
21
-
-
84880901653
-
The order of encryption and authentication for protecting communication (or: How secure is SSL?)
-
Springer-Verlag, Berlin
-
H. Krawczyk. The order of encryption and authentication for protecting communication (or: how secure is SSL?). In Proceedings of Advances in Cryptology (Crypto 2001), pp. 310-331. Springer-Verlag, Berlin, 2001.
-
(2001)
Proceedings of Advances in Cryptology (Crypto 2001)
, pp. 310-331
-
-
Krawczyk, H.1
-
22
-
-
84944878354
-
-
CRC Press, Boca Raton, FL
-
A. Menezes, P. van Oorschot, and S. Vanstone. Handbook of Applied Cryptography. CRC Press, Boca Raton, FL, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
23
-
-
0018048246
-
Using encryption and authentication in large networks of computers
-
R. Needham and M. Schroeder. Using encryption and authentication in large networks of computers. Communications of the ACM, 21:993-999, 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
24
-
-
0027589399
-
Fully-fledged two-way public key authentication and key management for low-cost terminals
-
M. Beller and Y. Yacobi. Fully-fledged two-way public key authentication and key management for low-cost terminals. Electronics Letters, 29:999-1001, 1993.
-
(1993)
Electronics Letters
, vol.29
, pp. 999-1001
-
-
Beller, M.1
Yacobi, Y.2
-
27
-
-
14844295011
-
Direct anonymous attestation
-
ACM Press, New York
-
E. Brickell, J. Camenisch, and L. Chen. Direct anonymous attestation. In Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 132-145. ACM Press, New York, 2004.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
28
-
-
0031540885
-
The performance of µ-kernel-based systems
-
ACM Press, New York
-
H. Härtig, M. Hohmuth, J. Liedtke, S. Schönberg, and J.Wolter. The performance of µ-kernel-based systems. In Proceedings of the 16th Symposium on Operating Systems Principles (SOSP’97), pp. 66-77. ACM Press, New York, 1997.
-
(1997)
Proceedings of the 16th Symposium on Operating Systems Principles (SOSP’97)
, pp. 66-77
-
-
Härtig, H.1
Hohmuth, M.2
Liedtke, J.3
Schönberg, S.4
Wolter, J.5
-
29
-
-
0001421170
-
EROS: A fast capability system
-
Operating Systems Review, ACM Press, New York
-
J. Shapiro, J. Smith, and D. Faber. EROS: a fast capability system. In Proceedings of the 17th Symposium on Operating Systems Principles (SOSP-99), Operating Systems Review, pp. 170-185. ACM Press, New York, 1999.
-
(1999)
Proceedings of the 17th Symposium on Operating Systems Principles (SOSP-99)
, pp. 170-185
-
-
Shapiro, J.1
Smith, J.2
Faber, D.3
-
30
-
-
0026254933
-
A restrospective on the VAX VMM security kernel
-
November
-
P. Karger, M. Zurko, D. Bonin, A. Mason, and C. Kahn. A restrospective on the VAX VMM security kernel. IEEE Transactions on Software Engineering, 17(11):1147-1165, November 1991.
-
(1991)
IEEE Transactions on Software Engineering
, vol.17
, Issue.11
, pp. 1147-1165
-
-
Karger, P.1
Zurko, M.2
Bonin, D.3
Mason, A.4
Kahn, C.5
-
32
-
-
35248859250
-
The Darknet and the future of content protection
-
Springer-Verlag, Berlin
-
P. Biddle, P. England, M. Peinado, and B. Willman. The Darknet and the future of content protection. In Proceedings of the 2nd ACM CCS Workshop on Digital Rights Management, pp. 155-176. Springer-Verlag, Berlin 2002.
-
(2002)
Proceedings of the 2nd ACM CCS Workshop on Digital Rights Management
, pp. 155-176
-
-
Biddle, P.1
England, P.2
Peinado, M.3
Willman, B.4
-
33
-
-
85084164351
-
Linux security modules: General security support in the Linux kernel
-
USENIX, Berkeley, CA
-
C.Wright, C. Cowan, S. Smalley, J. Morris, and G. Kroah-Hartman. Linux security modules: general security support in the Linux kernel. In Proceedings of the 11th USENIX Security Symposium, USENIX, Berkeley, CA, 2002.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
-
-
Wright, C.1
Cowan, C.2
Smalley, S.3
Morris, J.4
Kroah-Hartman, G.5
-
34
-
-
21644455412
-
Terra: A virtualmachine based platform for trusted computing
-
ACM Press, New York
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: a virtualmachine based platform for trusted computing. In Proceedings of the 19th Symposium on Operating Systems Principles (SOSP’03), pp. 193-206. ACM Press, New York, 2003.
-
(2003)
Proceedings of the 19th Symposium on Operating Systems Principles (SOSP’03)
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
35
-
-
84978438355
-
Scale and performance in the Denali isolation kernel
-
USENIX, Berkeley, CA
-
A. Whitaker, M. Shaw, and S. Gribble. Scale and performance in the Denali isolation kernel. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI’02), pp. 195-209. USENIX, Berkeley, CA, 2002.
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI’02)
, pp. 195-209
-
-
Whitaker, A.1
Shaw, M.2
Gribble, S.3
-
36
-
-
0030672130
-
Asecure and reliable bootstrap architecture
-
IEEE Computer Society, Los Alamites, CA
-
W. A. Arbaugh, D. J. Faber, and J. M. Smith.Asecure and reliable bootstrap architecture. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 65-71. IEEE Computer Society, Los Alamites, CA, 1997.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 65-71
-
-
Arbaugh, W.A.1
Faber, D.J.2
Smith, J.M.3
-
37
-
-
84958776015
-
Personal secure booting
-
V.Varadharajan andY. Mu, eds, Springer-Verlag, Berlin
-
N. Itoi, W. A. Arbaugh, S. J. Pollack, and D. M. Reeves. Personal secure booting. InV.Varadharajan andY. Mu, eds, Proceedings of 6th Australasian Conference on Information Security and Privacy (ACISP 2001), pp. 130-144. Springer-Verlag, Berlin, 2001.
-
(2001)
Proceedings of 6th Australasian Conference on Information Security and Privacy (ACISP 2001)
, pp. 130-144
-
-
Itoi, N.1
Arbaugh, W.A.2
Pollack, S.J.3
Reeves, D.M.4
-
38
-
-
0004196480
-
-
Ph.D. thesis, Carnegie Mellon University
-
B. Yee. Using Secure Coprocessors. Ph.D. thesis, Carnegie Mellon University, 1994.
-
(1994)
Using Secure Coprocessors
-
-
Yee, B.1
-
39
-
-
84958045366
-
Using a high-performance, programmable secure coprocessor
-
Springer-Verlag, Berlin
-
S. W. Smith, E. R. Palmer, and S. Weingart. Using a high-performance, programmable secure coprocessor. In Proceedings of the Second International Conference on Financial Cryptography, pp. 73-89. Springer-Verlag, Berlin, 1998.
-
(1998)
Proceedings of the Second International Conference on Financial Cryptography
, pp. 73-89
-
-
Smith, S.W.1
Palmer, E.R.2
Weingart, S.3
-
40
-
-
0037547629
-
Trusting trusted hardware: Towards a formal model for programmable secure coprocessors
-
USENIX, Berkeley, CA
-
S. W. Smith and V. Austel. Trusting trusted hardware: towards a formal model for programmable secure coprocessors. In Proceedings of the Third USENIXWorkshop on Electronic Commerce, pp. 83-98. USENIX, Berkeley, CA, 1998.
-
(1998)
Proceedings of the Third USENIXWorkshop on Electronic Commerce
, pp. 83-98
-
-
Smith, S.W.1
Austel, V.2
-
41
-
-
0033293553
-
Building a high-performance, programmable secure coprocessor
-
April
-
S.W. Smith and S.Weingart. Building a high-performance, programmable secure coprocessor. Computer Networks, 31(8):831-860, April 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 831-860
-
-
Smith, S.W.1
Weingart, S.2
-
42
-
-
0041745478
-
Signing and marking Active X controls
-
P. Johns. Signing and marking Active X controls. In Developer Network News, 1996. http://msdn.microsoft.com/library/default.asp?url =library/ends/dnaxctrl/html/msdn_signmark.asp
-
(1996)
Developer Network News
-
-
Johns, P.1
-
43
-
-
0003224492
-
-
Technical Report 546-97, Princeton University, Princeton, NJ
-
D.Wallach, D. Balfanz, D. Dean, and E. Felten. Extensible security architectures for Java. Technical Report 546-97, Princeton University, Princeton, NJ, 1997.
-
(1997)
Extensible security architectures for Java
-
-
Wallach, D.1
Balfanz, D.2
Dean, D.3
Felten, E.4
-
45
-
-
85013567460
-
File integrity in a disk-based multi-access system
-
C. A. R. Hoare and R. H. Perrot, eds, Academic Press
-
A. Fraser. File integrity in a disk-based multi-access system. In C. A. R. Hoare and R. H. Perrot, eds, Operating Systems Techniques. Academic Press, 1972.
-
(1972)
Operating Systems Techniques
-
-
Fraser, A.1
-
47
-
-
0028380781
-
Authentication in the Taos operating system
-
February
-
E. Wobber, M. Abadi, M. Burrows, and B. Lampson. Authentication in the Taos operating system.ACMTransactions on Computer Systems, 12(1):3-32, February 1994.
-
(1994)
ACMTransactions on Computer Systems
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
|