Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
92 | Paulo Veríssimo, António Casimiro, Christof Fetzer |
he Timely Computing Base: Timely Actions in the Presence of Uncertain Timeliness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 25-28 June 2000, New York, NY, USA, pp. 533-542, 2000, IEEE Computer Society, 0-7695-0707-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
75 | Bob Blakley 0001, Darrell M. Kienzle |
Some weaknesses of the TCB model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 3-5, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
TCB model weaknesses, systems construction, system security architectures, security of data, security requirements, trusted computing base |
74 | Tiancheng Li, Xiaonan Ma, Ninghui Li |
WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 472-488, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
63 | Lenin Singaravelu, Calton Pu, Hermann Härtig, Christian Helmuth |
Reducing TCB complexity for security-sensitive applications: three case studies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April 18-21, 2006, pp. 161-174, 2006, ACM, 1-59593-322-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
trusted computing base, application security |
63 | Michael Hohmuth, Michael Peter, Hermann Härtig, Jonathan S. Shapiro |
Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS European Workshop ![In: Proceedings of the 11st ACM SIGOPS European Workshop, Leuven, Belgium, September 19-22, 2004, pp. 22, 2004, ACM. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
57 | Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil D. Gligor, Adrian Perrig |
TrustVisor: Efficient TCB Reduction and Attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 31st IEEE Symposium on Security and Privacy, SP 2010, 16-19 May 2010, Berleley/Oakland, California, USA, pp. 143-158, 2010, IEEE Computer Society, 978-0-7695-4035-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Minimal TCB, Virtualization, Trusted Computing, TPM, Attestation, Integrity Measurement |
55 | Derek Gordon Murray, Grzegorz Milos, Steven Hand 0001 |
Improving Xen security through disaggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VEE ![In: Proceedings of the 4th International Conference on Virtual Execution Environments, VEE 2008, Seattle, WA, USA, March 5-7, 2008, pp. 151-160, 2008, ACM, 978-1-59593-796-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
virtual machines, trusted computing base, disaggregation |
55 | Jeong Woo Lee 0001, Richard E. Blahut |
Convergence Analysis and BER Performance of Finite-Length Turbo Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Commun. ![In: IEEE Trans. Commun. 55(5), pp. 1033-1043, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Tom Waayers |
An improved Test Control Architecture and Test Control Expansion for Core-Based System Chips. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITC ![In: Proceedings 2003 International Test Conference (ITC 2003), Breaking Test Interface Bottlenecks, 28 September - 3 October 2003, Charlotte, NC, USA, pp. 1145-1154, 2003, IEEE Computer Society, 0-7803-8106-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
55 | Robert R. Schneck, George C. Necula |
A Gradual Approach to a More Trustworthy, Yet Scalable, Proof-Carrying Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CADE ![In: Automated Deduction - CADE-18, 18th International Conference on Automated Deduction, Copenhagen, Denmark, July 27-30, 2002, Proceedings, pp. 47-62, 2002, Springer, 3-540-43931-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
55 | António Casimiro, Paulo Veríssimo |
Using the Timely Computing Base for Dependable QoS Adaptation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 20th Symposium on Reliable Distributed Systems (SRDS 2001), 28-31 October 2001, New Orleans, LA, USA, pp. 208-217, 2001, IEEE Computer Society, 0-7695-1366-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
45 | Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri |
How low can you go?: recommendations for hardware-supported minimal TCB code execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASPLOS ![In: Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2008, Seattle, WA, USA, March 1-5, 2008, pp. 14-25, 2008, ACM, 978-1-59593-958-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
late launch, secure execution, trusted computing |
37 | Gail-Joon Ahn, Wenjuan Xu, Xinwen Zhang |
Systematic Policy Analysis for High-Assurance Services in SELinux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2-4 June 2008, Palisades, New York, USA, pp. 3-10, 2008, IEEE Computer Society, 978-0-7695-3133-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
SELinux, Policy Analysis |
37 | Debra L. Cook, Ricardo A. Baratto, Angelos D. Keromytis |
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 363-375, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Andrew W. Appel, Neophytos G. Michael, Aaron Stump, Roberto Virga |
A Trustworthy Proof Checker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Autom. Reason. ![In: J. Autom. Reason. 31(3-4), pp. 231-260, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
proof checker, proof-carrying code |
37 | Howard E. Shrobe, Jon Doyle |
Active Trust Management for Autonomous Adaptive Survivable Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSAS ![In: Self-Adaptive Software, First International Workshop, IWSAS 2000, Oxford, UK, April 17-19, 2000, Revised Papers, pp. 40-49, 2000, Springer, 3-540-41655-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
37 | Mark Aldrich |
Secured Systems and Ada: A Trusted System Software Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRI-Ada ![In: Proceedings of the 1994 Conference on TRI-Ada 1994, November 6-11, 1994, Baltimore, Maryland, USA., pp. 282-292, 1994, ACM, 0-89791-666-2. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
Ada |
32 | Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Seiji Mune, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi |
A Two-Step Execution Mechanism for Thin Secure Hypervisors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 129-135, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
TCB, ID management, Security, Virtual machine monitor, Hypervisor, Trusted Computing Base, VMM |
26 | Taichi Takemura, Ryo Yamamoto, Kuniyasu Suzaki |
TEE-PA: TEE Is a Cornerstone for Remote Provenance Auditing on Edge Devices With Semi-TCB. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 26536-26549, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Ting-Yu Chen, Zong-Yu Wang, Tsung-Chu Huang |
TCB Convolution: Ternary-Coded Binarized Convolutions with Fixed-Point Filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCE-Taiwan ![In: International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2023, PingTung, Taiwan, July 17-19, 2023, pp. 95-96, 2023, IEEE, 979-8-3503-2417-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Zhihao Yao 0001, Seyed Mohammadjavad Seyed Talebi, Mingyi Chen, Ardalan Amiri Sani, Thomas E. Anderson |
Minimizing a Smartphone's TCB for Security-Critical Programs with Exclusively-Used, Physically-Isolated, Statically-Partitioned Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services, MobiSys 2023, Helsinki, Finland, June 18-22, 2023, pp. 233-246, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Haikuan Zhu, Juan Cao, Yanyang Xiao, Zhonggui Chen, Zichun Zhong, Yongjie Jessica Zhang |
TCB-spline-based Image Vectorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Graph. ![In: ACM Trans. Graph. 41(3), pp. 34:1-34:17, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Boqian Fu, Fahao Chen, Peng Li 0017, Deze Zeng |
TCB: Accelerating Transformer Inference Services with Request Concatenation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP ![In: Proceedings of the 51st International Conference on Parallel Processing, ICPP 2022, Bordeaux, France, 29 August 2022 - 1 September 2022, pp. 6:1-6:11, 2022, ACM, 978-1-4503-9733-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Moritz Schneider, Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Capkun |
PIE: A Dynamic TCB for Remote Systems with a Platform Isolation Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2010.10416, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
26 | Marcela S. Melara, Michael J. Freedman, Mic Bowman |
EnclaveDom: Privilege Separation for Large-TCB Applications in Trusted Execution Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1907.13245, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
26 | Naila Bushra, Naresh Adhikari, Mahalingam Ramkumar |
A TCB Minimizing Model of Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSCC ![In: Security in Computing and Communications - 6th International Symposium, SSCC 2018, Bangalore, India, September 19-22, 2018, Revised Selected Papers, pp. 455-470, 2018, Springer, 978-981-13-5825-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Ramana Kumar, Eric Mullen, Zachary Tatlock, Magnus O. Myreen |
Software Verification with ITPs Should Use Binary Code Extraction to Reduce the TCB - (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITP ![In: Interactive Theorem Proving - 9th International Conference, ITP 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 9-12, 2018, Proceedings, pp. 362-369, 2018, Springer, 978-3-319-94820-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Eric Mullen, Stuart Pernsteiner, James R. Wilcox, Zachary Tatlock, Dan Grossman |
Œuf: minimizing the Coq extraction TCB. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPP ![In: Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs, CPP 2018, Los Angeles, CA, USA, January 8-9, 2018, pp. 172-185, 2018, ACM, 978-1-4503-5586-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Bruno Vavala, Nuno Ferreira Neves, Peter Steenkiste |
Secure Tera-scale Data Crunching with a Small TCB. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017, Denver, CO, USA, June 26-29, 2017, pp. 169-180, 2017, IEEE Computer Society, 978-1-5386-0542-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Job Noorman, Jan Tobias Mühlberg, Frank Piessens |
Authentic Execution of Distributed Event-Driven Applications with a Small TCB. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STM ![In: Security and Trust Management - 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings, pp. 55-71, 2017, Springer, 978-3-319-68062-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Shweta Shinde, Dat Le Tien, Shruti Tople, Prateek Saxena |
Panoply: Low-TCB Linux Applications With SGX Enclaves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017, 2017, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
26 | Jaemin Park, Kwangjo Kim |
TM-Coin: Trustworthy management of TCB measurements in IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2017, Kona, Big Island, HI, USA, March 13-17, 2017, pp. 654-659, 2017, IEEE, 978-1-5090-4338-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Chen Zhou 0001, Hao Jiang 0010, Yanqiu Chen, Jing Wu 0016, Jianguo Zhou, Yuanshan Wu |
TCB: A feature transformation method based central behavior for user interest prediction on mobile big data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Distributed Sens. Networks ![In: Int. J. Distributed Sens. Networks 12(10), 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Weizhong Qiang, Kang Zhang, Hai Jin 0001 |
Reducing TCB of Linux Kernel Using User-Space Device Driver. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA3PP ![In: Algorithms and Architectures for Parallel Processing - 16th International Conference, ICA3PP 2016, Granada, Spain, December 14-16, 2016, Proceedings, pp. 572-585, 2016, Springer, 978-3-319-49582-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Francois Serman |
Reducing hardware TCB in favor of certifiable virtual machine monitor. (Réduction des besoins de confiance matérielle pour le développement d'un hyperviseur certifié). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2016 |
RDF |
|
26 | Yossi Gilad, Amir Herzberg, Ari Trachtenberg |
Securing Smartphones: A Micro-TCB Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1401.7444, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
26 | Florian Yger |
Challenge IEEE-ISBI/TCB : Application of Covariance matrices and wavelet marginals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1410.2663, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
26 | Munam Ali Shah, Irfan Azam, Muhammad Qasim Khan, Sijing Zhang |
Enhanced micro-TCB approach for smartphone security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAC ![In: 20th International Conference on Automation and Computing, ICAC 2014, Cranfield, Bedfordshire, United Kingdom, September 12-13, 2014, pp. 301-305, 2014, IEEE, 978-1-909522-02-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Min Li, Zili Zha, Wanyu Zang, Meng Yu 0001, Peng Liu 0005, Kun Bai |
Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (1) ![In: Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I, pp. 310-325, 2014, Springer, 978-3-319-11202-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Bernhard Kauer |
Improving system security through TCB reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2014 |
RDF |
|
26 | Arun Velagapalli, Mahalingam Ramkumar |
Trustworthy TCB for DNS Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 14(4), pp. 187-205, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
26 | Reinhard Tartler, Anil Kurmus, Bernhard Heinloth, Valentin Rothberg, Andreas Ruprecht, Daniela Dorneanu, Rüdiger Kapitza, Wolfgang Schröder-Preikschat, Daniel Lohmann |
Automatic OS Kernel TCB Reduction by Leveraging Compile-Time Configurability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HotDep ![In: Proceedings of the Eighth Workshop on Hot Topics in System Dependability, HotDep 2012, Hollywood, CA, USA, October 7, 2012, 2012, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
26 | Somya D. Mohanty, Arun Velagapalli, Mahalingam Ramkumar |
An Efficient TCB for a Generic Content Distribution System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberC ![In: 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2012, Sanya, China, October 10-12, 2012, pp. 5-12, 2012, IEEE Computer Society, 978-1-4673-2624-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Anbang Ruan, Andrew P. Martin |
RepCloud: achieving fine-grained cloud TCB attestation with reputation systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC@CCS ![In: Proceedings of the sixth ACM workshop on Scalable trusted computing, STC@CCS 2011, Chicago, Illinois, USA, October 17, 2011, pp. 3-14, 2011, ACM, 978-1-4503-1001-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Masana Murase, Hideyuki Tokuda |
Dependable TCB Based on the Cell Broadband Engine Isolation Facility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTCSA (1) ![In: 17th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2011, Toyama, Japan, August 28-31, 2011, Volume 1, pp. 360-370, 2011, IEEE Computer Society, 978-1-4577-1118-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Xin Zhang 0003, Zongwei Zhou, Geoffrey Hasker, Adrian Perrig, Virgil D. Gligor |
Network fault localization with small TCB. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Proceedings of the 19th annual IEEE International Conference on Network Protocols, ICNP 2011, Vancouver, BC, Canada, October 17-20, 2011, pp. 143-154, 2011, IEEE Computer Society, 978-1-4577-1392-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Arun Velagapalli, Mahalingam Ramkumar |
Minimizing the TCB for securing SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![In: Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2011, Oak Ridge, TN, USA, October 12-14, 2011, pp. 19, 2011, ACM, 978-1-4503-0945-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Mark R. Heckman, Roger R. Schell, Edwards E. Reed |
Using a high assurance TCB for infrastructure security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![In: Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2011, Oak Ridge, TN, USA, October 12-14, 2011, pp. 55, 2011, ACM, 978-1-4503-0945-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Ryan W. Gardner, Sujata Garera, Aviel D. Rubin |
Designing for Audit: A Voting Machine with a Tiny TCB. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 14th International Conference, FC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers, pp. 312-319, 2010, Springer, 978-3-642-14576-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Yong Li, Xing Zhang |
A trust model of TCB subsets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMLC ![In: International Conference on Machine Learning and Cybernetics, ICMLC 2010, Qingdao, China, July 11-14, 2010, Proceedings, pp. 2838-2842, 2010, IEEE. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Guangdeng Liao, Laxmi N. Bhuyan, Wei Wu, Heeyeol Yu, Steve R. King |
A new TCB cache to efficiently manage TCP sessions for web servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANCS ![In: Proceedings of the 2010 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, ANCS 2010, San Diego, California, USA, October 25-26, 2010, pp. 25, 2010, ACM, 978-1-4503-0379-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Hiroshi Isozaki |
Flicker: an execution infrastructure for tcb minimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, pp. 315-328, 2008, ACM, 978-1-60558-013-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
late launch, secure execution, trusted computing |
26 | Sung-Sae Lee, Seong-Wook Choi, Gun-Woo Moon |
High-Efficiency Active-Clamp Forward Converter With Transient Current Build-Up (TCB) ZVS Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Electron. ![In: IEEE Trans. Ind. Electron. 54(1), pp. 310-318, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Jacob Gorm Hansen, Eske Christiansen, Eric Jul |
Evil twins: two models for TCB reduction in HPC clusters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 41(4), pp. 20-29, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri |
Minimal TCB Code Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 267-272, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Steven R. Hackenberg |
CICS open transaction environment and other TCB performance considerations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. CMG Conference ![In: 32nd International Computer Measurement Group Conference, December 3-6, 2006, Reno, Nevada, USA, Proceedings, pp. 967-974, 2006, Computer Measurement Group. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
26 | Anthony G. Mungal |
A TCB/SRB Analysis Approach To Estimating CPU Productivity Through Fast I/O. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. CMG Conference ![In: 21st International Computer Measurement Group Conference, December 4-8, 1995, Nashville, TN, USA, Proceedings, pp. 502-518, 1995, Computer Measurement Group. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP BibTeX RDF |
|
26 | Jingsha He, Virgil D. Gligor |
Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 57-76, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
26 | Cristi Garvey, Thomas H. Hinke, Nancy R. Jensen, Jane Solomon, Amy Wu |
A Layered TCB Implementation versus the Hinke-Schaefer Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Database Security, III: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Monterey, California, USA, September 5-7, 1989, pp. 151-165, 1989, North-Holland, 0-444-88701-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP BibTeX RDF |
|
26 | Helena B. Winkler-Parenty |
Considerations on TCB subsetting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 105-106, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
26 | Richard J. Feiertag |
Does TCB subsetting enhance trust? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
26 | Linda L. Vetter, Gordon Smith, Teresa F. Lunt |
TCB subsets: the next step. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 216-221, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
26 | Linda L. Vetter |
TCB subset architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
26 | James P. Anderson |
An Approach to Indentification of Minimum TCB Requirements for Various Threat/Risk Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: Proceedings of the 1983 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 25-27, 1983, pp. 102-106, 1983, IEEE Computer Society, 0-8186-0467-0. The full citation details ...](Pics/full.jpeg) |
1983 |
DBLP DOI BibTeX RDF |
|
18 | Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn |
Towards System Integrity Protection with Graph-Based Policy Analysis. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXIII, 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings, pp. 65-80, 2009, Springer, 978-3-642-03006-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Derek Gordon Murray, Steven Hand 0001 |
Privilege separation made easy: trusting small libraries not big processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROSEC ![In: Proceedings of the First European Workshop on System Security, EUROSEC 2008, Glasgow, Scotland, UK, March 31, 2008, pp. 40-46, 2008, ACM, 978-1-60558-119-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
libraries, virtualisation, disaggregation |
18 | Heidar Pirzadeh, Danny Dubé |
VEP: a virtual machine for extended proof-carrying code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VMSec ![In: Proceedings of the 1st ACM Workshop on Virtual Machine Security, VMSec 2008, Alexandria, VA, USA, October 27, 2008, pp. 9-18, 2008, ACM, 978-1-60558-298-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
virtual machine, proof-carrying code |
18 | Anbang Ruan, Qingni Shen, Yuanyou Yin |
A Generalized Trusted Virtualized Platform Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2340-2346, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, Robert Tappan Morris, M. Frans Kaashoek |
Alpaca: extensible authorization for distributed services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 432-444, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, cryptography, authorization, theorem-proving, logic |
18 | Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, Hiroshi Maruyama |
Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings, pp. 65-80, 2006, Springer, 3-540-44601-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Hermann Härtig, Michael Hohmuth, Norman Feske, Christian Helmuth, Adam Lackorzynski, Frank Mehnert, Michael Peter |
The Nizza secure-system architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Proceedings of the 1st International Conference on Collaborative Computing: Networking, Applications and Worksharing, San Jose, CA, USA, December 19-21, 2005, 2005, IEEE Computer Society / ICST, 1-4244-0030-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Pedro Martins, Paulo Jorge Paiva de Sousa, António Casimiro, Paulo Veríssimo |
Dependable Adaptive Real-Time Applications in Wormhole-based Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June - 1 July 2004, Florence, Italy, Proceedings, pp. 567-, 2004, IEEE Computer Society, 0-7695-2052-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | António Casimiro, Paulo Veríssimo |
Generic Timing Fault Tolerance using a Timely Computing Base. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2002 International Conference on Dependable Systems and Networks (DSN 2002), 23-26 June 2002, Bethesda, MD, USA, Proceedings, pp. 27-38, 2002, IEEE Computer Society, 0-7695-1597-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
18 | Haruna R. Isa, William R. Shockley, Cynthia E. Irvine |
A Multi-Threading Architecture for Multilevel Secure Transaction Processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1999 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 9-12, 1999, pp. 166-180, 1999, IEEE Computer Society, 0-7695-0176-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
18 | Simon N. Foley, Li Gong, Xiaolei Qian |
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1996 IEEE Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, USA, pp. 142-153, 1996, IEEE Computer Society, 0-8186-7417-2. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
18 | Roshan K. Thomas, Ravi S. Sandhu |
Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 403-428, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
Replicated architecture, writeup, serial correctness, signaling channels, object-oriented databases, message-filtering |