Logical attestation: an authorization architecture for trustworthy computing
暂无分享,去创建一个
Emin Gün Sirer | Fred B. Schneider | Dan Williams | Kevin Walsh | Alan Shieh | Patrick Reynolds | Willem de Bruijn | E. Sirer | F. Schneider | W. D. Bruijn | Patrick Reynolds | Alan Shieh | K. Walsh | Dan Williams | Kevin Walsh | E. G. Sirer
[1] Jack B. Dennis,et al. Programming semantics for multiprogrammed computations , 1966, CACM.
[2] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[3] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[4] Morrie Gasser,et al. The Digital Distributed System Security Architecture , 1989 .
[5] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[6] Winfried E. Kühnhauser,et al. The BirliX Security Architecture , 1993, J. Comput. Secur..
[7] Martín Abadi,et al. Authentication in the Taos operating system , 1994, TOCS.
[8] Ken Thompson,et al. Plan 9 from Bell Labs , 1995 .
[9] Li Gong,et al. Java security: present and near future , 1997, IEEE Micro.
[10] William A. Arbaugh,et al. A secure and reliable bootstrap architecture , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[11] Jochen Liedtke,et al. The performance of μ-kernel-based systems , 1997, SOSP.
[12] Emin Gün Sirer,et al. Design and implementation of a distributed virtual machine for networked computers , 1999, SOSP.
[13] Jonathan M. Smith,et al. EROS: a fast capability system , 1999, SOSP.
[14] Mike Hibler,et al. The Flask Security Architecture: System Support for Diverse Security Policies , 1999, USENIX Security Symposium.
[15] Andrew W. Appel,et al. Proof-carrying authentication , 1999, CCS '99.
[16] Úlfar Erlingsson,et al. IRM enforcement of Java stack inspection , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[17] Fred B. Schneider,et al. Enforceable security policies , 2000, TSEC.
[18] Radek Vingralek,et al. How to build a trusted database system on untrusted storage , 2000, OSDI.
[19] Birgit Pfitzmann,et al. The PERSEUS System Architecture , 2001 .
[20] David Mazières,et al. Fast and secure distributed read-only file system , 2000, TOCS.
[21] Richard Stallman. Can you trust your computer , 2002 .
[22] Hermann Härtig,et al. Security architectures revisited , 2002, EW 10.
[23] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[24] Butler W. Lampson,et al. A Trusted Open Platform , 2003, Computer.
[25] Mark Horowitz,et al. Implementing an untrusted operating system on trusted hardware , 2003, SOSP '03.
[26] Trent Jaeger,et al. Design and Implementation of a TCG-based Integrity Measurement Architecture , 2004, USENIX Security Symposium.
[27] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[28] Michael Franz,et al. Semantic remote attestation: a virtual machine directed approach to trusted computing , 2004 .
[29] Butler W. Lampson,et al. 31. Paper: Computer Security in the Real World Computer Security in the Real World , 2022 .
[30] Dennis Shasha,et al. Secure Untrusted Data Repository (SUNDR) , 2004, OSDI.
[31] Emin Gün Sirer,et al. Peer-to-Peer Authentication with a Distributed Single Sign-On Service , 2004, IPTPS.
[32] Steve Vandebogart,et al. Labels and event processes in the Asbestos operating system , 2005, TOCS.
[33] Hermann Härtig,et al. The Nizza secure-system architecture , 2005, 2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[34] R. Sailer,et al. sHype : Secure Hypervisor Approach to Trusted Virtualized Systems , 2005 .
[35] Elaine Shi,et al. BIND: a fine-grained attestation service for secure distributed systems , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[36] Emin Gün Sirer,et al. Securing BGP Using External Security Monitors , 2006 .
[37] Srinivas Devadas,et al. Virtual monotonic counters and count-limited objects using a TPM without a trusted OS , 2006, STC '06.
[38] Stefan Berger,et al. vTPM: Virtualizing the Trusted Platform Module , 2006, USENIX Security Symposium.
[39] Eddie Kohler,et al. Making information flow explicit in HiStar , 2006, OSDI '06.
[40] Srinivas Devadas,et al. Offline untrusted storage with immediate detection of forking and replay attacks , 2007, STC '07.
[41] Robert Tappan Morris,et al. Alpaca: extensible authorization for distributed services , 2007, CCS '07.
[42] Scott Shenker,et al. Attested append-only memory: making adversaries stick to their word , 2007, SOSP.
[43] Emin Gün Sirer,et al. Device Driver Safety Through a Reference Validation Mechanism , 2008, OSDI.
[44] Paul England,et al. Para-Virtualized TPM Sharing , 2008, TRUST.
[45] Martín Abadi. Variations in Access Control Logic , 2008, DEON.
[46] Mark Handley,et al. Wedge: Splitting Applications into Reduced-Privilege Compartments , 2008, NSDI.
[47] Hermann Härtig,et al. VPFS: building a virtual private file system with a small trusted computing base , 2008, Eurosys '08.
[48] Ahmad-Reza Sadeghi,et al. Property-Based TPM Virtualization , 2008, ISC.
[49] Michael K. Reiter,et al. Flicker: an execution infrastructure for tcb minimization , 2008, Eurosys '08.
[50] Michael Norrish,et al. seL4: formal verification of an OS kernel , 2009, SOSP '09.
[51] Jacob R. Lorch,et al. TrInc: Small Trusted Hardware for Large Distributed Systems , 2009, NSDI.
[52] Hari Balakrishnan,et al. Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks , 2009, NSDI.
[53] Adrian Perrig,et al. Bootstrapping Trust in Commodity Computers , 2010, 2010 IEEE Symposium on Security and Privacy.
[54] Adrian Perrig,et al. TrustVisor: Efficient TCB Reduction and Attestation , 2010, 2010 IEEE Symposium on Security and Privacy.
[55] Emin Gün Sirer,et al. Nexus authorization logic (NAL): Design rationale and applications , 2011, TSEC.