Design and Implementation of Virtual Private Services
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Terra: a virtual machine-based platform for trusted computing
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Property-based attestation for computing platforms: caring about properties, not mechanisms
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Symmetric behavior-based trust: a new paradigm for internet computing
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Design and implementation of a TCG-based integrity measurement architecture
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Layering negotiations for flexible attestation
Proceedings of the first ACM workshop on Scalable trusted computing
Chinese-wall process confinement for practical distributed coalitions
Proceedings of the 12th ACM symposium on Access control models and technologies
Security and Trust in IT Business Outsourcing: a Manifesto
Electronic Notes in Theoretical Computer Science (ENTCS)
TVDc: managing security in the trusted virtual datacenter
ACM SIGOPS Operating Systems Review
Policy enforcement and compliance proofs for Xen virtual machines
Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments
Secure Sharing of an ICT Infrastructure through Vinci
AIMS '08 Proceedings of the 2nd international conference on Autonomous Infrastructure, Management and Security: Resilient Networks and Services
Flexible and secure enterprise rights management based on trusted virtual domains
Proceedings of the 3rd ACM workshop on Scalable trusted computing
Integrity Management Infrastructure for Trusted Computing
IEICE - Transactions on Information and Systems
Measuring Semantic Integrity for Remote Attestation
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
An Integrity Assurance Mechanism for Run-Time Programs
Information Security and Cryptology
Towards automated security policy enforcement in multi-tenant virtual data centers
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
RunTest: assuring integrity of dataflow processing in cloud computing infrastructures
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Windows vault: prevention of virus infection and secret leakage with secure OS and virtual machine
WISA'07 Proceedings of the 8th international conference on Information security applications
Proceedings of the 1st International Conference on Energy-Efficient Computing and Networking
Security for the cloud infrastructure: trusted virtual data center implementation
IBM Journal of Research and Development
Transparent mobile storage protection in trusted virtual domains
LISA'09 Proceedings of the 23rd conference on Large installation system administration
Trusted virtual containers on demand
Proceedings of the fifth ACM workshop on Scalable trusted computing
Trusted virtual domains on OpenSolaris: usable secure desktop environments
Proceedings of the fifth ACM workshop on Scalable trusted computing
Proceedings of the 1st ACM International Health Informatics Symposium
Attestation of integrity of overlay networks
Journal of Systems Architecture: the EUROMICRO Journal
Toward trustworthy clouds' internet scale critical infrastructure
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Verifying trustworthiness of virtual appliances in collaborative environments
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Trusted virtual domains on OKL4: secure information sharing on smartphones
Proceedings of the sixth ACM workshop on Scalable trusted computing
Proceedings of the 2011 Symposium on Simulation for Architecture and Urban Design
Bridging the gap between inter-communication boundary and internal trusted components
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Managing critical infrastructures through virtual network communities
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
Trusted virtual domains – design, implementation and lessons learned
INTRUST'09 Proceedings of the First international conference on Trusted Systems
Trusted integrity measurement and reporting for virtualized platforms
INTRUST'09 Proceedings of the First international conference on Trusted Systems
Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Virtualization: Issues, security threats, and solutions
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
The focus of trusted computing efforts to date has been to create islands of trust in a sea of distrust, identifying these islands as dependable domains with a solid base that can be used for building applications upon which critical services depend. The aim of our work is to extend this solid base by building "bridges" among trusted islands, with such goals as enabling meaningful trade agreements between islands, enabling migration of individual island inhabitants, and enabling geography-independent affiliation among inhabitants of different islands.