Use of Trusted Software Modules for Emergency-Integrity Display
暂无分享,去创建一个
Cynthia E. Irvine | David J. Shifflett | Timothy E. Levin | Thuy D. Nguyen | Timothy Vidas | Paul C. Clark
[1] Cynthia E. Irvine,et al. SecureCore software architecture trusted path application (TPA) requirements , 2007 .
[2] John M. Rushby,et al. Design and verification of secure systems , 1981, SOSP.
[3] Cynthia E. Irvine,et al. A cautionary note regarding the data integrity capacity of certain secure systems , 2001, IICIS.
[4] Ruby B. Lee,et al. Hardware-rooted trust for secure key management and transient trust , 2007, CCS '07.
[5] Terry V. Benzel,et al. Design Principles and Guidelines for Security , 2007 .
[6] Cynthia E. Irvine,et al. Analysis of three multilevel security architectures , 2007, CSAW '07.
[7] Ruby B. Lee,et al. Architecture for protecting critical secrets in microprocessors , 2005, 32nd International Symposium on Computer Architecture (ISCA'05).
[8] Cynthia E. Irvine,et al. A security architecture for transient trust , 2008, CSAW '08.