An Open Trusted Computing Architecture — Secure Virtual Machines Enabling User-Defined Policy Enforcement
暂无分享,去创建一个
M. Schunter | D. Kuhlmann | Rainer Landfermann | H. Ramasamy | G. Ramunno | Davide Vernizzi | Harigovind V. Ramasamy
[1] Jochen Liedtke,et al. The performance of μ-kernel-based systems , 1997, SOSP.
[2] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[3] HarrisTim,et al. Xen and the art of virtualization , 2003 .
[4] Sean W. Smith,et al. Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear , 2003 .
[5] Sean W. Smith,et al. Bear: An Open-Source Virtual Secure Coprocessor based on TCPA , 2003 .
[6] Michael Franz,et al. Semantic remote attestation: a virtual machine directed approach to trusted computing , 2004 .
[7] Michael Franz,et al. Awarded Best Paper! Semantic Remote Attestation - Virtual Machine Directed Approach to Trusted Computing , 2004, Virtual Machine Research and Technology Symposium.
[8] R. Sailer,et al. The Role of TPM in Enterprise Security , 2004 .
[9] Sean W. Smith,et al. Open-source applications of TCPA hardware , 2004, 20th Annual Computer Security Applications Conference.
[10] Ahmad-Reza Sadeghi,et al. Property-based attestation for computing platforms: caring about properties, not mechanisms , 2004, NSPW '04.
[11] M. Schunter,et al. Property Attestation — Scalable and Privacy-friendly Security Assessment of Peer Computers , 2004 .
[12] Tal Garfinkel,et al. When Virtual Is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments , 2005, HotOS.
[13] Trent Jaeger,et al. Trusted virtual domains: toward secure distributed services , 2005 .
[14] Stefan Berger,et al. Building a MAC-based security architecture for the Xen open-source hypervisor , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).