Next: About this document ...
Up: vTPM: Virtualizing the Trusted
Previous: Acknowledgments
- 1
-
Fabrice Bellard.
Qemu, a fast and portable dynamic translator.
In Proceedings of the USENIX 2005 Annual Technical Conference,
FREENIX Track, pages 41-46, 2005.
- 2
-
C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and
A. Warfield.
Live Migration of Virtual Machines.
In Proceedings of the 2nd Symposium on Networked Systems Design
and Implementation (NSDI '05), 2005.
- 3
-
Common Criteria.
Trusted Computing Group (TCG) Personal Computer (PC) Specific
Trusted Building Block (TBB) Protection Profile and TCG PC Specific TBB With
Maintenance Protection Profile, July 2004.
- 4
-
B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, I. Pratt, A. Warfield,
P. Barham, and R. Neugebauer.
Xen and the Art of Virtualization.
In Proceedings of the ACM Symposium on Operating Systems
Principles, October 2003.
- 5
-
R. Figueiredo, P. A. Dinda, and J. Fortes.
Resource virtualization renaissance.
IEEE Computer, 38(5):28-31, 2005.
- 6
-
K. Fraser, S. Hand, R. Neugebauer, I. Pratt, A. Warfield, and M. Williamson.
Safe Hardware Access with the Xen Virtual Machine Monitor.
In Proceedings of the OASIS ASPLOS Workshop, 2004.
- 7
-
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, and Dan Boneh.
Terra: a Virtual Machine-based Platform for Trusted Computing.
In Proceedings of the Symposium on Operating Systems Principles
(SOSP), pages 193-206, 2003.
- 8
-
R. P. Goldberg.
Survey of Virtual Machine Research.
IEEE Computer Magazine, 7(6):34-45, 1974.
- 9
-
Applied Data Security Group.
What is TrustedGRUB,
https://www.prosec.ruhr-uni-bochum.de/trustedgrub.html.
- 10
-
Trusted Computing Group.
TCG TPM Specification Version 1.2 - Part 1 Design Principles, 2005.
- 11
-
Trusted Computing Group.
TCG TPM Specification Version 1.2 - Part 3 Commands, 2005.
- 12
-
IBM.
IBM eServer x366.
https://www-03.ibm.com/servers/eserver/xseries/x366.html.
- 13
-
IBM.
Integrity Measurement Architecture for Linux.
https://www.sourceforge.net/projects/linux-ima.
- 14
-
IBM.
PHYP: Converged POWER Hypervisor Firmware for pSeries and iSeries.
https://www-1.ibm.com/servers/enable/site/
peducation/abstracts/abs2bb2.html.
- 15
-
IBM.
Secure Coprocessing.
https://www.research.ibm.com/secure
systemsdepartment/projects/scop/index.html.
- 16
-
IBM.
Trusted Virtual Data Center.
https://domino.research.ibm.com/comm/researchprojects.nsf/
pages/ssdtrustedvirtualdatacenter.index.html.
- 17
-
U. Kühn, K. Kursawe, S. Lucks, A. Sadeghi, and C. Stüble.
Secure data management in trusted computing.
In Proceedings of Workshop on Cryptographic Hardware and
Embedded Systems (CHES 2005), 2005.
- 18
-
H. Maruyama, F. Seliger, N. Nagaratnam, T. Ebringer, S. Munetoh, S. Yoshihama,
and T. Nakamura.
Trusted platform on demand.
Technical Report RT0564, IBM, February 2004.
- 19
-
National Institute of Standards and Technology.
Secure Hash Standard (SHA-1).
Federal Information Processing Standards Publication 180-1, 1993.
- 20
-
R. Sailer, T. Jaeger, E. Valdez, R. Cáceres, R. Perez, S. Berger,
J. Griffin, and L. van Doorn.
Building a MAC-based security architecture for the Xen opensource
hypervisor.
In Proceedings of the Annual Computer Security Applications
Conference (ACSAC), December 2005.
- 21
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn.
Design and implementation of a TCG-based integrity measurement
architecture.
In Proceedings of the USENIX Security Symposium, 2004.
- 22
-
The Xen Team.
Xen Interface Manual - Xen v3.0 for x86.
- 23
-
Trusted Computing Group.
https://www.trustedcomputinggroup.org.
- 24
-
Trusted Computing Group.
TCG PC Specific Implementation Specification, 2003.
- 25
-
Trusted Computing Group.
TCG Software Stack (TSS) Specification - Version 1.10 Golden, 2003.
- 26
-
VMware, Inc.
https://www.vmware.com.
- 27
-
Xensource.
Xen Open-Source Hypervisor.
https://www.xensource.com/products/downloads.
root
2006-05-12