Requirements and Design Guidelines for a Trusted Hypervisor Interface
暂无分享,去创建一个
[1] Birgit Pfitzmann,et al. Die PERSEUS Systemarchitektur , 2001 .
[2] Sihan Qing,et al. Proceedings of the 7th international conference on Information and Communications Security , 2001 .
[3] Birgit Pfitzmann,et al. Trusting Mobile User Devices and Security Modules , 1997, Computer.
[4] Ka-Ping Yee,et al. User Interaction Design for Secure Systems , 2002, ICICS.
[5] Norman Feske,et al. A Nitpickers guide to a minimal-complexity secure GUI , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[6] M. Schunter,et al. An Open Trusted Computing Architecture — Secure Virtual Machines Enabling User-Defined Policy Enforcement , 2006 .
[7] Ahmad-Reza Sadeghi,et al. Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[8] J. Doug Tygar,et al. The battle against phishing: Dynamic Security Skins , 2005, SOUPS '05.