Author:
Peinado Marcus,Chen Yuqun,England Paul,Manferdelli John
Publisher
Springer Berlin Heidelberg
Reference28 articles.
1. Abadi, M.: Trusted computing, trusted third parties and verified communications (2004)
2. Abadi, M., Wobber, T.: A logical account of NGSCB (2004)
3. Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: Proceedings of the 19th Symposium on Operating Systems Principles (SOSP 2003), pp. 164–177 (2003)
4. Bell, D., La Padula, L.: Secure computer systems: Mathematical foundations and model. Technical Report M74-244, Mitre Corporation (1975)
5. Berson, T., Barksdale, G.: KSOS – a development methodology for a secure operating system. In: Proceedings of the 1979 AFIPS National Computer Conference, pp. 365–371 (1979)
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. TZ-Container: protecting container from untrusted OS with ARM TrustZone;Science China Information Sciences;2021-08-19
2. Micro-Hypervisor Applications;Practical Security Properties on Commodity Computing Platforms;2019
3. SecureKeeper;Proceedings of the 17th International Middleware Conference;2016-11-28
4. Trust Enforcing and Trust Building, Different Technologies and Visions;International Journal of Cyber Warfare and Terrorism;2012-10
5. Security-Preserving Live Migration of Virtual Machines in the Cloud;Journal of Network and Systems Management;2012-09-02