Trusted computing base

Results: 152



#Item
51Theoretical computer science / Formal methods / L4 microkernel family / Microkernel / Formal verification / Isabelle / Trusted computing base / Gernot Heiser / Kernel / Computer architecture / Software / Computing

seL4: Formal Verification of an OS Kernel Gerwin Klein1,2 , Kevin Elphinstone1,2 , Gernot Heiser1,2,3 June Andronick1,2 , David Cock1 , Philip Derrin1∗, Dhammika Elkaduwe1,2‡, Kai Engelhardt1,2 Rafal Kolanski1,2 , Mi

Add to Reading List

Source URL: www.ok-labs.com

Language: English - Date: 2010-10-07 14:23:07
52Microkernel / Trusted computing base / L4 microkernel family / Monolithic kernels / Virtual machines / Gernot Heiser / Kernel / Embedded system / Linux kernel / Computer architecture / System software / Software

Secure Embedded Systems Need Microkernels Gernot Heiser National ICT Australia∗ and University of New South Wales Sydney, Australia

Add to Reading List

Source URL: www.ok-labs.com

Language: English - Date: 2010-10-07 14:23:41
53Evaluation / Trusted computing base / Microkernel / L4 microkernel family / Real-time operating systems / Gernot Heiser / Formal verification / Isabelle / Formal methods / Computer security / Computer architecture / Computing

Mathematically Verified Software Kernels: Raising the Bar for High Assurance Implementations Dr Daniel Potts, VP of Engineering, General Dynamics C4 Systems Rene Bourquin, Member Technical Staff, General Dynamics C4 Syst

Add to Reading List

Source URL: sel4.systems

Language: English - Date: 2014-07-28 22:03:39
54Gernot Heiser / L4 microkernel family / Formal verification / Real-time operating systems / Kernel / Computer security / Integrity / Mach / Ring / Computer architecture / Trusted computing base / Microkernel

seL4 for Dependable Systems Software Developing dependable systems requires built-in security and safety at all levels of the system, including in the lowest-level system software: the operating system and device access

Add to Reading List

Source URL: sel4.systems

Language: English - Date: 2014-09-23 22:58:53
55Evaluation / Formal methods / Microkernel / L4 microkernel family / Trusted computing base / Gernot Heiser / Formal verification / Kernel / Evaluation Assurance Level / Computer architecture / System software / Computing

Your System is Secure? Prove it! Gernot Heiser NICTA∗ and University of New South Wales and Open Kernel Labs Sydney, Australia [removed]

Add to Reading List

Source URL: www.ok-labs.com

Language: English - Date: 2010-10-07 14:22:41
56Cryptography / Disk encryption / Trusted Platform Module / Trusted Computing Group / Cryptographic software / BitLocker Drive Encryption / TPM / USB flash drive / Next-Generation Secure Computing Base / Computer security / Microsoft Windows / Trusted computing

TPM 2.0 Library Studienarbeit Department of Computer Science University of Applied Science Rapperswil Autumn Term 2013

Add to Reading List

Source URL: eprints.hsr.ch

Language: English - Date: 2014-04-25 08:10:54
57Trusted computing / Next-Generation Secure Computing Base / PlayReady / Copy Control / Trusted Platform Module / InterTrust Technologies / Copy protection / OMA DRM / Protected Media Path / Computer security / Digital rights management / Copyright law

Technological Copyright Enforcement and Open Access Volker Grassmuck for Open Archives Forum Workshop[removed]HU Berlin

Add to Reading List

Source URL: www.oaforum.org

Language: English - Date: 2003-10-17 10:49:35
58Trusted Platform Module / Next-Generation Secure Computing Base / Emulator / TPM / Virtual machine / Virtualization / Direct Anonymous Attestation / Computer security / Trusted computing / Cryptography

vii TABLE OF CONTENTS CHAPTER

Add to Reading List

Source URL: eprints.utm.my

Language: English - Date: 2012-07-15 20:40:54
59Trusted computing / Cryptography / Hashing / Monolithic kernels / Next-Generation Secure Computing Base / Trusted Platform Module / Procfs / Kernel / Hash table / Computer architecture / Computing / Computer security

Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

Add to Reading List

Source URL: sigops.org

Language: English - Date: 2011-09-20 03:37:00
60National security / Computer network security / Secure communication / Security policy / Reference monitor / Trusted computing base / Kernel / Protection mechanism / Vulnerability / Computer security / Security / Crime prevention

A Language-Based Approach to Security Fred B. Schneider1 , Greg Morrisett1 , and Robert Harper2 2 1 Cornell University, Ithaca, NY

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-13 15:41:39
UPDATE