Sciweavers

160 search results - page 13 / 32
» Key Attestation from Trusted Execution Environments
Sort
View
123
Voted
ATAL
1999
Springer
15 years 3 months ago
Towards a Distributed, Environment-Centered Agent Framework
Abstract. This paper will discuss the internal architecture for an agent framework called DECAF (Distributed Environment Centered Agent Framework). DECAF is a software toolkit for ...
John R. Graham, Keith Decker
ACSAC
2001
IEEE
15 years 3 months ago
Restricting Access with Certificate Attributes in Multiple Root Environments-A Recipe for Certificate Masquerading
The issue of certificate masquerading against the SSL protocol is pointed out in [4]. In [4], various forms of server certificate masquerading are identified. It should also be no...
James M. Hayes
MICRO
2009
IEEE
129views Hardware» more  MICRO 2009»
15 years 6 months ago
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the contro...
Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederi...
CSI
2007
89views more  CSI 2007»
14 years 11 months ago
Writing and executing ODP computational viewpoint specifications using Maude
The Reference Model of Open Distributed Processing (RM-ODP) is a joint standardization effort by ITU-T and ISO/IEC for the specification of large open distributed systems. RM-ODP ...
José Raúl Romero, Antonio Vallecillo...
NSDI
2007
15 years 1 months ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...