We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity hardware. Applications on Terra enjoy the semantics of running on a separate, dedicated, tamper-resistant hardware platform, while retaining the ability to run side-by-side with normal applications on a generalpurpose computing platform. Terra achieves this synthesis by use of a trusted virtual machine monitor (TVMM) that partitions a tamper-resistant hardware platform into multiple, isolated virtual machines (VM), providing the appearance of multiple boxes on a single, general-purpose platform. To each VM, the TVMM provides the semantics of either an “open box, ” i.e....
Virtual Machine Monitors (VMMs), also called hypervisors,can be used to construct a trusted computin...
We present the design of a trusted platform module (TPM) that supports hardware-based virtualization...
Abstract. Over the past years, many different approaches and con-cepts in order to increase computer...
Abstract. The concept of Trusted Computing (TC) promises a new approach to improve the security of c...
The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in ...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
Many corporations, private organizations, and government agencies maintain sensitive data that must ...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
In this report, we describe mechanisms for secure deployment of virtual machines on shared platforms...
In view of some new security issues in the computing platform with virtualization technology, this p...
Abstract. Systems running commodity software are easily compromised with malware, which may be used ...
Personal computer owners often want to be able to run security-critical programs on the same machine...
Hardware-based trusted computing platforms are intended to overcome many of the problems of trust th...
Ubiquitous computing is revolutionizing the way applications, users, resources, and physical spaces ...
Virtual Machine Monitors (VMMs), also called hypervisors,can be used to construct a trusted computin...
We present the design of a trusted platform module (TPM) that supports hardware-based virtualization...
Abstract. Over the past years, many different approaches and con-cepts in order to increase computer...
Abstract. The concept of Trusted Computing (TC) promises a new approach to improve the security of c...
The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in ...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
Many corporations, private organizations, and government agencies maintain sensitive data that must ...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
In this report, we describe mechanisms for secure deployment of virtual machines on shared platforms...
In view of some new security issues in the computing platform with virtualization technology, this p...
Abstract. Systems running commodity software are easily compromised with malware, which may be used ...
Personal computer owners often want to be able to run security-critical programs on the same machine...
Hardware-based trusted computing platforms are intended to overcome many of the problems of trust th...
Ubiquitous computing is revolutionizing the way applications, users, resources, and physical spaces ...
Virtual Machine Monitors (VMMs), also called hypervisors,can be used to construct a trusted computin...
We present the design of a trusted platform module (TPM) that supports hardware-based virtualization...
Abstract. Over the past years, many different approaches and con-cepts in order to increase computer...