Enhancing Data Trustworthiness via Assured Digital Signing
暂无分享,去创建一个
[1] W H I T E P A P E R,et al. The Architecture of VMware ESXi , 2008 .
[2] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[3] Dennis G. Kafura,et al. Identifying native applications with high assurance , 2012, CODASPY '12.
[4] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[5] Ernest F. Brickell,et al. Direct anonymous attestation , 2004, CCS '04.
[6] Brian S. Madden. Citrix Presentation Server 4.5: The Unauthorized Advanced Technical Design Guide (Advanced Technical Design Guide series) , 2007 .
[7] Xiaoxin Chen,et al. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems , 2008, ASPLOS.
[8] Gene Itkis,et al. SiBIR: Signer-Base Intrusion-Resilient Signatures , 2002, CRYPTO.
[9] Zhi Wang,et al. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity , 2010, CCS '10.
[10] Udo Steinberg,et al. NOVA: a microhypervisor-based secure virtualization architecture , 2010, EuroSys '10.
[11] Eyal de Lara,et al. SnowFlock: rapid virtual machine cloning for cloud computing , 2009, EuroSys '09.
[12] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[13] Shouhuai Xu,et al. Expecting the Unexpected: Towards Robust Credential Infrastructure , 2009, Financial Cryptography.
[14] Kang G. Shin,et al. Using hypervisor to provide data secrecy for user applications on a per-page basis , 2008, VEE '08.
[15] A. Kivity,et al. kvm : the Linux Virtual Machine Monitor , 2007 .
[16] Michael K. Reiter,et al. Flicker: an execution infrastructure for tcb minimization , 2008, Eurosys '08.
[17] Mihir Bellare,et al. A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.
[18] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[19] Bennet S. Yee,et al. Using Secure Coprocessors , 1994 .
[20] Rafail Ostrovsky,et al. How to withstand mobile virus attacks (extended abstract) , 1991, PODC '91.
[21] Shouhuai Xu,et al. Strong Key-Insulated Signature Schemes , 2003, Public Key Cryptography.
[22] Ruby B. Lee,et al. Architectural support for hypervisor-secure virtualization , 2012, ASPLOS XVII.
[23] Jennifer Rexford,et al. Eliminating the hypervisor attack surface for a more secure cloud , 2011, CCS '11.
[24] R. Sunitha,et al. DATA-PROVENANCE VERIFICATION FOR SECURE HOSTS , 2013 .
[25] Zhi Wang,et al. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity , 2010, 2010 IEEE Symposium on Security and Privacy.
[26] Peng Ning,et al. SICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms , 2011, CCS '11.
[27] Ron Oglesby,et al. VMware ESX Server: Advanced Technical Design Guide (Advanced Technical Design Guide series) , 2005 .
[28] Stephen Smalley,et al. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments , 2000 .
[29] Adrian Perrig,et al. TrustVisor: Efficient TCB Reduction and Attestation , 2010, 2010 IEEE Symposium on Security and Privacy.
[30] Michael Norrish,et al. seL4: formal verification of an OS kernel , 2009, SOSP '09.
[31] David Lie,et al. Splitting interfaces: making trust between applications and operating systems configurable , 2006, OSDI '06.
[32] Vinod Vaikuntanathan,et al. Simultaneous Hardcore Bits and Cryptography against Memory Attacks , 2009, TCC.