DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Trusted Computing Base
Trusted Computing Base
Inspecting Data from the Safety of Your Trusted Execution Environment
Leveraging ARM Trustzone and Verifiable Computing to Provide Auditable Mobile Functions Nuno O
Trusted Computing Serving an Anonymity Service
The Nizza Secure-System Architecture
Reducing TCB Size by Using Untrusted Components — Small Kernels Versus Virtual-Machine Monitors
Trusted Computer System Evaluation Criteria
Secure Bootstrap Is Not Enough: Shoring up the Trusted Computing Base James Hendricks Leendert Van Doorn Carnegie Mellon University IBM T.J
Trusted Computing Base
TC) and Next Generation Secured Computing Base (NGSCB
Topic 20: TCSEC and Common Criteria
TCG Guidance for Secure Update of Software and Firmware on F Embedded Systems E
Georgios V. Michalakidis
[email protected]
Lecture 16: Security
Lecture #4: OS Security Concepts
A Secure Computing Platform for Building Automation Using Microkernel-Based Operating Systems Xiaolong Wang University of South Florida,
[email protected]
Security Models Trusted Computing Base Reference Monitor Access
Securing Commercial Operating Systems
Trustframe, a Software Development Framework for Trustzone-Enabled Hardware
Top View
Introducing Genode
Securing Commercial Systems
Evaluation of OKL4
Exploring the Integration of Memory Management and Trusted Computing
An Overview of Trusted Computing [Pdf]
Trends and Directions in Trusted Computing: Models, Architectures and Technologies
Security in Ordinary Operating Systems
Trustworthy Computing and Attestation
Download This Presentation
Sel4 for Dependable Systems Software
Separating Hypervisor Trusted Computing Base Supported by Hardware
Safe and Automatic Live Update
Nighthawk: Transparent System Introspection from Ring -3
Challenges for Trusted Computing
The Sel4 Microkernel an Introduction
Proof-Oriented Design of a Separation Kernel with Minimal Trusted Computing Base Narjes Jomaa, Paolo Torrini, David Nowak, Gilles Grimaud, Samuel Hym
Sel4 Whitepaper [Pdf]
Operating Systems & Virtualisation Security