Trust and Trustworthy Computing
暂无分享,去创建一个
Stefan Katzenbeisser | L. Jean Camp | Xinwen Zhang | Michael K. Reiter | Melanie Volkamer | Edgar Weippl
[1] Hai Jin,et al. Innovations for Grid Security from Trusted Computing , 2009, Security Protocols Workshop.
[2] Peng Ning,et al. SICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms , 2011, CCS '11.
[3] Stefan Berger,et al. Building a MAC-based security architecture for the Xen open-source hypervisor , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[4] Trent Jaeger,et al. Seeding clouds with trust anchors , 2010, CCSW '10.
[5] J. Gabriel. The Defense , 2013 .
[6] Zhi Wang,et al. Process out-grafting: an efficient "out-of-VM" approach for fine-grained process execution monitoring , 2011, CCS '11.
[7] Johannes Winter,et al. Trusted computing building blocks for embedded linux-based ARM trustzone platforms , 2008, STC '08.
[8] Daniel M. Hein,et al. A Trusted Computing Identity Collation Protocol to Simplify Deployment of New Disaster Response Devices , 2010, J. Univers. Comput. Sci..
[9] Adrian Perrig,et al. TrustVisor: Efficient TCB Reduction and Attestation , 2010, 2010 IEEE Symposium on Security and Privacy.
[10] Trent Jaeger,et al. Establishing and Sustaining System Integrity via Root of Trust Installation , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[11] Trent Jaeger,et al. Justifying Integrity Using a Virtual Machine Verifier , 2009, 2009 Annual Computer Security Applications Conference.
[12] Peter Lipp,et al. A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing , 2007, TGC.
[13] Dhananjay S. Phatak,et al. Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing , 2010, TRUST.
[14] Michael Gissing,et al. acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity , 2010, INTRUST.
[15] Johannes Winter,et al. Lightweight Distributed Attestation for the Cloud , 2012, CLOSER.
[16] Martin Pirker,et al. A PrivacyCA for Anonymity and Trust , 2009, TRUST.
[17] Jean-Pierre Seifert,et al. A trusted mobile phone reference architecturevia secure kernel , 2007, STC '07.
[18] Andrew P. Martin,et al. myTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Managment , 2011, CloudCom.
[19] Stefan Berger,et al. Shamon: A System for Distributed Mandatory Access Control , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[20] Andrew P. Martin,et al. Towards a secure, tamper-proof grid platform , 2006, Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID'06).
[21] Siegfried Podesser,et al. A Software Architecture for Introducing Trust in Java-Based Clouds , 2011, STA.
[22] David Lie,et al. Splitting interfaces: making trust between applications and operating systems configurable , 2006, OSDI '06.
[23] Daniele Catteddu and Giles Hogben. Cloud Computing. Benefits, risks and recommendations for information security , 2009 .
[24] Michael Gissing,et al. Dynamic Enforcement of Platform Integrity , 2010, TRUST.
[25] Thomas Friese,et al. Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques , 2006, J. Parallel Distributed Comput..
[26] Michael K. Reiter,et al. Flicker: an execution infrastructure for tcb minimization , 2008, Eurosys '08.
[27] Stefan Katzenbeisser,et al. Improving the scalability of platform attestation , 2008, STC '08.
[28] David Grawrock,et al. Dynamics of a trusted platform: a building block approach , 2009 .
[29] Ahmad-Reza Sadeghi,et al. Enhancing Grid Security Using Trusted Virtualization , 2007, ATC.
[30] Jeffrey S. Chase,et al. Trusted platform-as-a-service: a foundation for trustworthy cloud-hosted applications , 2011, CCSW '11.
[31] Angelos Stavrou,et al. Exploiting smart-phone USB connectivity for fun and profit , 2010, ACSAC '10.
[32] Krishna P. Gummadi,et al. Towards Trusted Cloud Computing , 2009, HotCloud.
[33] Martin Pirker,et al. Towards Trust Services for Language-Based Virtual Machines for Grid Computing , 2008, TRUST.
[34] Weiqing Sun,et al. Practical Proactive Integrity Preservation: A Basis for Malware Defense , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[35] Udo Steinberg,et al. NOVA: a microhypervisor-based secure virtualization architecture , 2010, EuroSys '10.
[36] Gerhard Jentzsch,et al. Working group on , 1991 .
[37] Wayne Salamon,et al. Implementing SELinux as a Linux Security Module , 2003 .
[38] Sean W. Smith. Outbound authentication for programmable secure coprocessors , 2004, International Journal of Information Security.
[39] Johannes Winter,et al. A Hijacker's Guide to the LPC Bus , 2011, EuroPKI.
[40] Stefan Berger,et al. TVDc: managing security in the trusted virtual datacenter , 2008, OPSR.