The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for TCB with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1983-2000 (15) 2001-2007 (17) 2008-2011 (19) 2012-2017 (15) 2018-2024 (10)
Publication types (Num. hits)
article(12) inproceedings(62) phdthesis(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 36 occurrences of 27 keywords

Results
Found 76 publication records. Showing 76 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
92Paulo Veríssimo, António Casimiro, Christof Fetzer he Timely Computing Base: Timely Actions in the Presence of Uncertain Timeliness. Search on Bibsonomy DSN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
75Bob Blakley 0001, Darrell M. Kienzle Some weaknesses of the TCB model. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF TCB model weaknesses, systems construction, system security architectures, security of data, security requirements, trusted computing base
74Tiancheng Li, Xiaonan Ma, Ninghui Li WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
63Lenin Singaravelu, Calton Pu, Hermann Härtig, Christian Helmuth Reducing TCB complexity for security-sensitive applications: three case studies. Search on Bibsonomy EuroSys The full citation details ... 2006 DBLP  DOI  BibTeX  RDF trusted computing base, application security
63Michael Hohmuth, Michael Peter, Hermann Härtig, Jonathan S. Shapiro Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors. Search on Bibsonomy ACM SIGOPS European Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
57Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil D. Gligor, Adrian Perrig TrustVisor: Efficient TCB Reduction and Attestation. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Minimal TCB, Virtualization, Trusted Computing, TPM, Attestation, Integrity Measurement
55Derek Gordon Murray, Grzegorz Milos, Steven Hand 0001 Improving Xen security through disaggregation. Search on Bibsonomy VEE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF virtual machines, trusted computing base, disaggregation
55Jeong Woo Lee 0001, Richard E. Blahut Convergence Analysis and BER Performance of Finite-Length Turbo Codes. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
55Tom Waayers An improved Test Control Architecture and Test Control Expansion for Core-Based System Chips. Search on Bibsonomy ITC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
55Robert R. Schneck, George C. Necula A Gradual Approach to a More Trustworthy, Yet Scalable, Proof-Carrying Code. Search on Bibsonomy CADE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
55António Casimiro, Paulo Veríssimo Using the Timely Computing Base for Dependable QoS Adaptation. Search on Bibsonomy SRDS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
45Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri How low can you go?: recommendations for hardware-supported minimal TCB code execution. Search on Bibsonomy ASPLOS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF late launch, secure execution, trusted computing
37Gail-Joon Ahn, Wenjuan Xu, Xinwen Zhang Systematic Policy Analysis for High-Assurance Services in SELinux. Search on Bibsonomy POLICY The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SELinux, Policy Analysis
37Debra L. Cook, Ricardo A. Baratto, Angelos D. Keromytis Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Andrew W. Appel, Neophytos G. Michael, Aaron Stump, Roberto Virga A Trustworthy Proof Checker. Search on Bibsonomy J. Autom. Reason. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF proof checker, proof-carrying code
37Howard E. Shrobe, Jon Doyle Active Trust Management for Autonomous Adaptive Survivable Systems. Search on Bibsonomy IWSAS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
37Mark Aldrich Secured Systems and Ada: A Trusted System Software Architecture. Search on Bibsonomy TRI-Ada The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Ada
32Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Seiji Mune, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi A Two-Step Execution Mechanism for Thin Secure Hypervisors. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF TCB, ID management, Security, Virtual machine monitor, Hypervisor, Trusted Computing Base, VMM
26Taichi Takemura, Ryo Yamamoto, Kuniyasu Suzaki TEE-PA: TEE Is a Cornerstone for Remote Provenance Auditing on Edge Devices With Semi-TCB. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
26Ting-Yu Chen, Zong-Yu Wang, Tsung-Chu Huang TCB Convolution: Ternary-Coded Binarized Convolutions with Fixed-Point Filters. Search on Bibsonomy ICCE-Taiwan The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Zhihao Yao 0001, Seyed Mohammadjavad Seyed Talebi, Mingyi Chen, Ardalan Amiri Sani, Thomas E. Anderson Minimizing a Smartphone's TCB for Security-Critical Programs with Exclusively-Used, Physically-Isolated, Statically-Partitioned Hardware. Search on Bibsonomy MobiSys The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Haikuan Zhu, Juan Cao, Yanyang Xiao, Zhonggui Chen, Zichun Zhong, Yongjie Jessica Zhang TCB-spline-based Image Vectorization. Search on Bibsonomy ACM Trans. Graph. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Boqian Fu, Fahao Chen, Peng Li 0017, Deze Zeng TCB: Accelerating Transformer Inference Services with Request Concatenation. Search on Bibsonomy ICPP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Moritz Schneider, Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Capkun PIE: A Dynamic TCB for Remote Systems with a Platform Isolation Environment. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
26Marcela S. Melara, Michael J. Freedman, Mic Bowman EnclaveDom: Privilege Separation for Large-TCB Applications in Trusted Execution Environments. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
26Naila Bushra, Naresh Adhikari, Mahalingam Ramkumar A TCB Minimizing Model of Computation. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Ramana Kumar, Eric Mullen, Zachary Tatlock, Magnus O. Myreen Software Verification with ITPs Should Use Binary Code Extraction to Reduce the TCB - (Short Paper). Search on Bibsonomy ITP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Eric Mullen, Stuart Pernsteiner, James R. Wilcox, Zachary Tatlock, Dan Grossman Œuf: minimizing the Coq extraction TCB. Search on Bibsonomy CPP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Bruno Vavala, Nuno Ferreira Neves, Peter Steenkiste Secure Tera-scale Data Crunching with a Small TCB. Search on Bibsonomy DSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Job Noorman, Jan Tobias Mühlberg, Frank Piessens Authentic Execution of Distributed Event-Driven Applications with a Small TCB. Search on Bibsonomy STM The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Shweta Shinde, Dat Le Tien, Shruti Tople, Prateek Saxena Panoply: Low-TCB Linux Applications With SGX Enclaves. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
26Jaemin Park, Kwangjo Kim TM-Coin: Trustworthy management of TCB measurements in IoT. Search on Bibsonomy PerCom Workshops The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Chen Zhou 0001, Hao Jiang 0010, Yanqiu Chen, Jing Wu 0016, Jianguo Zhou, Yuanshan Wu TCB: A feature transformation method based central behavior for user interest prediction on mobile big data. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Weizhong Qiang, Kang Zhang, Hai Jin 0001 Reducing TCB of Linux Kernel Using User-Space Device Driver. Search on Bibsonomy ICA3PP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Francois Serman Reducing hardware TCB in favor of certifiable virtual machine monitor. (Réduction des besoins de confiance matérielle pour le développement d'un hyperviseur certifié). Search on Bibsonomy 2016   RDF
26Yossi Gilad, Amir Herzberg, Ari Trachtenberg Securing Smartphones: A Micro-TCB Approach. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
26Florian Yger Challenge IEEE-ISBI/TCB : Application of Covariance matrices and wavelet marginals. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
26Munam Ali Shah, Irfan Azam, Muhammad Qasim Khan, Sijing Zhang Enhanced micro-TCB approach for smartphone security. Search on Bibsonomy ICAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Min Li, Zili Zha, Wanyu Zang, Meng Yu 0001, Peng Liu 0005, Kun Bai Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization. Search on Bibsonomy ESORICS (1) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Bernhard Kauer Improving system security through TCB reduction. Search on Bibsonomy 2014   RDF
26Arun Velagapalli, Mahalingam Ramkumar Trustworthy TCB for DNS Servers. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2012 DBLP  BibTeX  RDF
26Reinhard Tartler, Anil Kurmus, Bernhard Heinloth, Valentin Rothberg, Andreas Ruprecht, Daniela Dorneanu, Rüdiger Kapitza, Wolfgang Schröder-Preikschat, Daniel Lohmann Automatic OS Kernel TCB Reduction by Leveraging Compile-Time Configurability. Search on Bibsonomy HotDep The full citation details ... 2012 DBLP  BibTeX  RDF
26Somya D. Mohanty, Arun Velagapalli, Mahalingam Ramkumar An Efficient TCB for a Generic Content Distribution System. Search on Bibsonomy CyberC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Anbang Ruan, Andrew P. Martin RepCloud: achieving fine-grained cloud TCB attestation with reputation systems. Search on Bibsonomy STC@CCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Masana Murase, Hideyuki Tokuda Dependable TCB Based on the Cell Broadband Engine Isolation Facility. Search on Bibsonomy RTCSA (1) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Xin Zhang 0003, Zongwei Zhou, Geoffrey Hasker, Adrian Perrig, Virgil D. Gligor Network fault localization with small TCB. Search on Bibsonomy ICNP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Arun Velagapalli, Mahalingam Ramkumar Minimizing the TCB for securing SCADA systems. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Mark R. Heckman, Roger R. Schell, Edwards E. Reed Using a high assurance TCB for infrastructure security. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Ryan W. Gardner, Sujata Garera, Aviel D. Rubin Designing for Audit: A Voting Machine with a Tiny TCB. Search on Bibsonomy Financial Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Yong Li, Xing Zhang A trust model of TCB subsets. Search on Bibsonomy ICMLC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Guangdeng Liao, Laxmi N. Bhuyan, Wei Wu, Heeyeol Yu, Steve R. King A new TCB cache to efficiently manage TCP sessions for web servers. Search on Bibsonomy ANCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Hiroshi Isozaki Flicker: an execution infrastructure for tcb minimization. Search on Bibsonomy EuroSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF late launch, secure execution, trusted computing
26Sung-Sae Lee, Seong-Wook Choi, Gun-Woo Moon High-Efficiency Active-Clamp Forward Converter With Transient Current Build-Up (TCB) ZVS Technique. Search on Bibsonomy IEEE Trans. Ind. Electron. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Jacob Gorm Hansen, Eske Christiansen, Eric Jul Evil twins: two models for TCB reduction in HPC clusters. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri Minimal TCB Code Execution. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Steven R. Hackenberg CICS open transaction environment and other TCB performance considerations. Search on Bibsonomy Int. CMG Conference The full citation details ... 2006 DBLP  BibTeX  RDF
26Anthony G. Mungal A TCB/SRB Analysis Approach To Estimating CPU Productivity Through Fast I/O. Search on Bibsonomy Int. CMG Conference The full citation details ... 1995 DBLP  BibTeX  RDF
26Jingsha He, Virgil D. Gligor Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
26Cristi Garvey, Thomas H. Hinke, Nancy R. Jensen, Jane Solomon, Amy Wu A Layered TCB Implementation versus the Hinke-Schaefer Approach. Search on Bibsonomy DBSec The full citation details ... 1989 DBLP  BibTeX  RDF
26Helena B. Winkler-Parenty Considerations on TCB subsetting. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
26Richard J. Feiertag Does TCB subsetting enhance trust? Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
26Linda L. Vetter, Gordon Smith, Teresa F. Lunt TCB subsets: the next step. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
26Linda L. Vetter TCB subset architecture. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
26James P. Anderson An Approach to Indentification of Minimum TCB Requirements for Various Threat/Risk Environments. Search on Bibsonomy S&P The full citation details ... 1983 DBLP  DOI  BibTeX  RDF
18Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn Towards System Integrity Protection with Graph-Based Policy Analysis. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Derek Gordon Murray, Steven Hand 0001 Privilege separation made easy: trusting small libraries not big processes. Search on Bibsonomy EUROSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF libraries, virtualisation, disaggregation
18Heidar Pirzadeh, Danny Dubé VEP: a virtual machine for extended proof-carrying code. Search on Bibsonomy VMSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF virtual machine, proof-carrying code
18Anbang Ruan, Qingni Shen, Yuanyou Yin A Generalized Trusted Virtualized Platform Architecture. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, Robert Tappan Morris, M. Frans Kaashoek Alpaca: extensible authorization for distributed services. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, cryptography, authorization, theorem-proving, logic
18Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, Hiroshi Maruyama Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Hermann Härtig, Michael Hohmuth, Norman Feske, Christian Helmuth, Adam Lackorzynski, Frank Mehnert, Michael Peter The Nizza secure-system architecture. Search on Bibsonomy CollaborateCom The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Pedro Martins, Paulo Jorge Paiva de Sousa, António Casimiro, Paulo Veríssimo Dependable Adaptive Real-Time Applications in Wormhole-based Systems. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18António Casimiro, Paulo Veríssimo Generic Timing Fault Tolerance using a Timely Computing Base. Search on Bibsonomy DSN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Haruna R. Isa, William R. Shockley, Cynthia E. Irvine A Multi-Threading Architecture for Multilevel Secure Transaction Processing. Search on Bibsonomy S&P The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
18Simon N. Foley, Li Gong, Xiaolei Qian A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification. Search on Bibsonomy S&P The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
18Roshan K. Thomas, Ravi S. Sandhu Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Replicated architecture, writeup, serial correctness, signaling channels, object-oriented databases, message-filtering
Displaying result #1 - #76 of 76 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license