Trusted computing base

Results: 152



#Item
91Compiler optimizations / Greg Morrisett / Year of birth missing / Computer security / Inline expansion / Trusted computing base / Java / Computing / Software engineering / Programming language theory

THE INLINED REFERENCE MONITOR APPROACH TO SECURITY POLICY ENFORCEMENT A Dissertation Presented to the Faculty of the Graduate School of Cornell University

Add to Reading List

Source URL: www.ru.is

Language: English - Date: 2003-11-11 14:39:56
92Security / Disk encryption / Trusted Platform Module / Trusted Execution Technology / Next-Generation Secure Computing Base / Ring / Security token / Physical Unclonable Function / Trusted computing base / Computer security / Trusted computing / Cryptography

INVITED PAPER Mobile Trusted Computing This paper surveys the trusted computing features in mobile computing platforms. By N. Asokan, Jan-Erik Ekberg, Kari Kostiainen, Anand Rajan, Carlos Rozas,

Add to Reading List

Source URL: rebootingcomputing.ieee.org

Language: English - Date: 2014-08-25 09:54:55
93Markup languages / Cloud clients / Portable software / HTML / Same origin policy / Cross-site scripting / Trusted computing base / JavaScript / Ring / Software / Computing / Google Chrome

Privilege Separation in HTML5 Applications Devdatta Akhawe, Prateek Saxena, Dawn Song University of California, Berkeley {devdatta,prateeks,dawnsong}@cs.berkeley.edu Abstract

Add to Reading List

Source URL: devd.me

Language: English - Date: 2014-11-09 00:08:12
94Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / Next-Generation Secure Computing Base / Counter / Cryptographic hash function / Extensible Storage Engine / Computer security / Trusted computing / Cryptography

Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TR[removed]September 11, 2006

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2006-09-12 07:35:22
95Error detection and correction / Cryptography / Cryptographic hash functions / Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / Next-Generation Secure Computing Base / Counter / Hash tree / Computer security / Trusted computing / Hashing

Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS ∗ Luis F. G. Sarmenta, Marten van Dijk, Charles W. O’Donnell, Jonathan Rhodes, and Srinivas Devadas

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2006-08-31 18:21:40
96Monolithic kernels / Kernel / Ring / Mandatory access control / Architecture of Windows NT / Operating system / Mach / Trusted computing base / Linux kernel / Computer architecture / System software / Software

Hardware Enforcement of Application Security Policies Using Tagged Memory Nickolai Zeldovich∗ , Hari Kannan† , Michael Dalton† , and Christos Kozyrakis† ∗ † MIT

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2008-10-09 13:10:59
97Trusted Platform Module / Trusted computing base / Virtual machine / Ring / Rootkit / Trusted Execution Technology / Trusted Computing Group / Computer security / Trusted computing / Cryptography

TrustVisor: Efficient TCB Reduction and Attestation Jonathan M. McCune, Ning Qu, Yanlin Li Anupam Datta, Virgil D. Gligor, Adrian Perrig March 9, 2009 (revised March 10, 2010)

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-07-09 18:37:15
98National security / Trusted computing base / Trusted Computing / Internet privacy / Public safety / Multilevel security / Security / Computer security / Crime prevention

Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection Petros Maniatis† , Devdatta Akhawe∗ , Kevin Fall† , Elaine Shi∗‡ , Stephen McCamant∗ , Dawn Song∗ ‡ PARC, ∗ UC Berkel

Add to Reading List

Source URL: scrub.cs.berkeley.edu

Language: English - Date: 2012-01-11 13:39:10
99CPU cache / Stack / Cache / Information flow / Pointer / Lookup table / Processor register / Program counter / Burroughs large systems / Computing / Central processing unit / Computer hardware

g-015 November 7, 2001 A Minimal Trusted Computing Base for Dynamically Ensuring Secure Information Flow

Add to Reading List

Source URL: www.ai.mit.edu

Language: English - Date: 2001-11-07 10:27:53
100Monolithic kernels / Kernel / Ring / Mandatory access control / Architecture of Windows NT / Operating system / Mach / Trusted computing base / Linux kernel / Computer architecture / System software / Software

Hardware Enforcement of Application Security Policies Using Tagged Memory Nickolai Zeldovich∗ , Hari Kannan† , Michael Dalton† , and Christos Kozyrakis† ∗ † MIT

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
UPDATE