Back to Results
First PageMeta Content



Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn
Add to Reading List

Document Date: 2011-10-27 11:53:48


Open Document

File Size: 1,57 MB

Share Result on Facebook

City

Credentials / Cascais / Hash / /

Company

AES / BlueStripe Software / Fauxbook / Google Inc / /

Country

Portugal / /

Currency

USD / /

/

Facility

Cornell University / Java Object Store / IPC port / /

IndustryTerm

secondary storage device / hardware manufacturer / assurance secure applications / web applications / web users / expected web framework process / conventional systems / trustworthy computing / trustworthy cloud-computing stack / software certification effort / web server layer / social networking site / web forums / web application / software whitelisting / applications / social networking service / software components / file systems / social networking systems / revocation infrastructure / completed accounting training / generic applications / web service / highintegrity applications / web framework code / software developer / analyzable open source software / cloudinfrastructure operator / software systems / update protocol / software configurations / image processing elements / web request flows / software stack / lighttpd web server / cloud infrastructure / authorization infrastructure / software certificates / trustworthy-computing applications / tenant applications / web server rests / guarantees today’s systems / web framework acting / mechanical processing / social networking application / user management / cloud computing environments / cloud computing application / Internet routing / trusted computing / online course / social networks / web server / media players / data-independent applications / generic application / social network / secure applications / web framework / web server process / social networking experience / processor hardware / legacy hardware / /

NaturalFeature

IPC channel / /

OperatingSystem

Unix / Linux / Posix / /

Organization

Nexus Privacy Authority / Cornell University / /

Person

Kevin Walsh Dan Williams Fred / Fred B. Schneider / Alan Shieh Kevin Walsh Dan / Patrick Reynolds / Bob / /

/

Position

driver / default Nexus guard / guard / speaker / label resource-manager / Python interpreter / proportional-share CPU scheduler / device driver / General / resource manager / player / legacy speaker / Movie Player / keyboard driver / network device driver / administrator / given BGP speaker / kernel-designated guard / guard control IPC / network driver / designated guard / software developer / user-level device driver / legacy BGP speaker / /

ProgrammingLanguage

Java / Python / /

PublishedMedium

the Nexus / /

Technology

BGP protocol / Countermode encryption / Unix / Linux / block cipher / cloning / private key / secret key / operating system / SSL / image processing / operating systems / TCP/IP / encryption / update protocol / Java / network interface card / following protocol / HTTP / paging / caching / web server / /

SocialTag