DR@FT: Efficient Remote Attestation Framework for Dynamic Systems
暂无分享,去创建一个
Jean-Pierre Seifert | Gail-Joon Ahn | Hongxin Hu | Wenjuan Xu | Xinwen Zhang | Xinwen Zhang | Wenjuan Xu | Gail-Joon Ahn | Hongxin Hu | J. Seifert
[1] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[2] Ravi S. Sandhu,et al. Lattice-based access control models , 1993, Computer.
[3] Sergey Brin,et al. The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.
[4] Timothy Fraser,et al. LOMAC: Low Water-Mark integrity protection for COTS environments , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[5] Niels Provos,et al. Preventing Privilege Escalation , 2003, USENIX Security Symposium.
[6] Trent Jaeger,et al. Analyzing Integrity Protection in the SELinux Example Policy , 2003, USENIX Security Symposium.
[7] Trent Jaeger,et al. Design and Implementation of a TCG-based Integrity Measurement Architecture , 2004, USENIX Security Symposium.
[8] Michael Franz,et al. Semantic remote attestation: a virtual machine directed approach to trusted computing , 2004 .
[9] Trent Jaeger,et al. Toward Automated Information-Flow Integrity Verification for Security-Critical Applications , 2006, NDSS.
[10] Trent Jaeger,et al. PRIMA: policy-reduced integrity measurement architecture , 2006, SACMAT '06.
[11] Ahmad-Reza Sadeghi,et al. A protocol for property-based attestation , 2006, STC '06.
[12] Stephen Smalley,et al. Configuring the SELinux Policy , 2008 .
[13] Ehud Gudes,et al. Data and Applications Security XXIII, 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings , 2009, Database Security.
[14] Gail-Joon Ahn,et al. Towards System Integrity Protection with Graph-Based Policy Analysis , 2009, DBSec.