Hardware-Assisted Application-Level Access Control
暂无分享,去创建一个
[1] Ruby B. Lee,et al. Hardware-rooted trust for secure key management and transient trust , 2007, CCS '07.
[2] LouAnna Notargiacomo,et al. Beyond the pale of MAC and DAC-defining new forms of access control , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] Donald W. Davies,et al. Advances in Cryptology — EUROCRYPT ’91 , 2001, Lecture Notes in Computer Science.
[4] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[5] Abhishek Kumar. Discovering passwords in the memory , 2003 .
[6] Jan Camenisch,et al. Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.
[7] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[8] Ruby B. Lee,et al. Architecture for protecting critical secrets in microprocessors , 2005, 32nd International Symposium on Computer Architecture (ISCA'05).
[9] Mark Horowitz,et al. Implementing an untrusted operating system on trusted hardware , 2003, SOSP '03.
[10] Michael K. Reiter,et al. Flicker: an execution infrastructure for tcb minimization , 2008, Eurosys '08.
[11] Xiaoxin Chen,et al. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems , 2008, ASPLOS.
[12] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[13] Leendert van Doorn,et al. A Practical Guide to Trusted Computing , 2007 .
[14] Jeremy Epstein. Fifteen Years after TX: A Look Back at High Assurance Multi-Level Secure Windowing , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[15] Alfredo De Santis,et al. Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.
[16] Jeffrey B. Lotspiech,et al. Security for the digital library-protecting documents rather than channels , 1998, Proceedings Ninth International Workshop on Database and Expert Systems Applications (Cat. No.98EX130).
[17] Kaoru Kurosawa,et al. Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings , 2007, International Conference on the Theory and Application of Cryptology and Information Security.
[18] Aggelos Kiayias,et al. Group Encryption , 2007, ASIACRYPT.