Author:
Jayaram K. R.,Safford David,Sharma Upendra,Naik Vijay,Pendarakis Dimitrios,Tao Shu
Reference31 articles.
1. ARM.ARM TrustZone Technology, 2014. http://www.arm.com/products/processors/technologies/trustzone/index.php.
2. S. Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy. Proof verification and the hardness of approximation problems.J. ACM, 45(3):501--555, May 1998.
3. J. Bacon, D. Evans, D. M. Eyers, M. Migliavacca, P. Pietzuch, and B. Shand. Enforcing end-to-end application security in the cloud (big ideas paper). InProceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware, Middleware '10, pages 293--312, Berlin, Heidelberg, 2010. Springer-Verlag.
4. S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn. vtpm: Virtualizing the trusted platform module. InProceedings of the 15th Conference on USENIX Security Symposium - Volume 15, USENIX-SS'06, Berkeley, CA, USA, 2006. USENIX Association.
5. B. Braun, A. J. Feldman, Z. Ren, S. Setty, A. J. Blumberg, and M. Walfish. Verifying computations with state. InProceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles, SOSP '13, pages 341--357, New York, NY, USA, 2013. ACM.
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Gmelina arborea– an indigenous timber species of India with high medicinal value: A review on its pharmacology, pharmacognosy and phytochemistry;Journal of Ethnopharmacology;2021-03
2. Recent trends in applying TPM to cloud computing;Security and Privacy;2019-11-28
3. SDVisor: Secure Debug Enclave with Hypervisor;2019 IEEE International Conference on Service-Oriented System Engineering (SOSE);2019-04
4. A Trusted Healthcare Data Analytics Cloud Platform;2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS);2018-07
5. TrApps;Proceedings of the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures;2017-04-23