Open-source applications of TCPA hardware
暂无分享,去创建一个
Sean W. Smith | Alex Barsamian | John Marchesini | Omen Wild | Joshua Stabiner | Sean W. Smith | Alex Barsamian | John Marchesini | Omen Wild | Joshua Stabiner
[1] Sean W. Smith,et al. Trusted S/MIME Gateways , 2003 .
[2] Robbert van Renesse,et al. COCA: a secure distributed online certification authority , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[3] Seth D. Schoen,et al. Trusted Computing: Promise and Risk , 2003 .
[4] Sean W. Smith,et al. Securing Web servers against insider attack , 2001, Seventeenth Annual Computer Security Applications Conference.
[5] Dan Boneh,et al. Architectural support for copy and tamper resistant software , 2000, SIGP.
[6] Sean W. Smith,et al. Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear , 2003 .
[7] Calton Pu,et al. CryptoMark: Locking the Stable door ahead of the Trojan Horse , 2000 .
[8] Sean W. Smith,et al. Bear: An Open-Source Virtual Secure Coprocessor based on TCPA , 2003 .
[9] Bennet S. Yee,et al. Using Secure Coprocessors , 1994 .
[10] Trent Jaeger,et al. Design and Implementation of a TCG-based Integrity Measurement Architecture , 2004, USENIX Security Symposium.
[11] Trent Jaeger,et al. Analyzing Integrity Protection in the SELinux Example Policy , 2003, USENIX Security Symposium.
[12] Sean W. Smith,et al. Secure coprocessing applications and research issues , 1996 .
[13] Siani Pearson,et al. Trusted Computing Platforms: TCPA Technology in Context , 2002 .
[14] G. Edward Suh,et al. AEGIS: architecture for tamper-evident and tamper-resistant processing , 2003, ICS.
[15] Sean W. Smith,et al. Privacy-enhanced credential services , 2003 .
[16] Fred B. Schneider. Secure systems conundrum , 2002, CACM.
[17] John P. McGregor,et al. Virtual Secure Coprocessing on General-purpose Processors , 2004 .
[18] Sean W. Smith,et al. Building a high-performance, programmable secure coprocessor , 1999, Comput. Networks.
[19] Edward W. Felten,et al. Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks? , 2003, IEEE Secur. Priv..
[20] Sean W. Smith,et al. Building the IBM 4758 Secure Coprocessor , 2001, Computer.
[21] Sean W. Smith,et al. Distributing security-mediated PKI , 2004, International Journal of Information Security.
[22] Sean W. Smith,et al. WebALPS: a survey of E-commerce privacy and security applications , 2001, SECO.
[23] Sean W. Smith. Outbound authentication for programmable secure coprocessors , 2004, International Journal of Information Security.
[24] Tal Garfinkel,et al. Flexible OS Support and Applications for Trusted Computing , 2003, HotOS.
[25] Fred B. Schneider,et al. COCA: a secure distributed online certification authority , 2002 .
[26] Robin Kravets,et al. MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .
[27] Sean Smith,et al. Virtual Hierarchies - An Architecture for Building and Maintaining Efficient and Resilient Trust Chains , 2002 .
[28] Leendert van Doorn,et al. Take control of TCPA , 2003 .
[29] Michelle J. Gosselin,et al. Confining the Apache Web Server with Security-Enhanced Linux , 2002 .
[30] Stephen Smalley,et al. Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.
[31] Bennet S. Yee,et al. Secure Coprocessors in Electronic Commerce Applications , 1995, USENIX Workshop on Electronic Commerce.
[32] David R. Safford. The Need for TCPA , 2002 .
[33] David R. Safford. Clarifying Misinformation on TCPA , 2002 .