Sciweavers

987 search results - page 10 / 198
» Implementing an untrusted operating system on trusted hardwa...
Sort
View
ACSAC
1999
IEEE
13 years 12 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
SP
1998
IEEE
13 years 11 months ago
Stack and Queue Integrity on Hostile Platforms
When computationally intensive tasks have to be carried out on trusted, but limited, platforms such as smart cards, it becomes necessary to compensate for the limited resources me...
Premkumar T. Devanbu, Stuart G. Stubblebine
PRDC
2008
IEEE
14 years 1 months ago
Countering IPC Threats in Multiserver Operating Systems (A Fundamental Requirement for Dependability)
Multiserver operating systems have great potential to improve dependability, but, paradoxically, are paired with inherently more complex interprocess communication (IPC). Several ...
Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Ho...
SOSP
2003
ACM
14 years 4 months ago
Terra: a virtual machine-based platform for trusted computing
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity har...
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenbl...
ISW
2009
Springer
14 years 2 months ago
Hardware-Assisted Application-Level Access Control
Abstract. Applications typically rely on the operating system to enforce access control policies such as MAC, DAC, or other policies. However, in the face of a compromised operatin...
Yu-Yuan Chen, Ruby B. Lee