Check out the new USENIX Web site. next up previous
Next: About this document ... Up: vTPM: Virtualizing the Trusted Previous: Acknowledgments

Bibliography

1
Fabrice Bellard.
Qemu, a fast and portable dynamic translator.
In Proceedings of the USENIX 2005 Annual Technical Conference, FREENIX Track, pages 41-46, 2005.

2
C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A. Warfield.
Live Migration of Virtual Machines.
In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI '05), 2005.

3
Common Criteria.
Trusted Computing Group (TCG) Personal Computer (PC) Specific Trusted Building Block (TBB) Protection Profile and TCG PC Specific TBB With Maintenance Protection Profile, July 2004.

4
B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, I. Pratt, A. Warfield, P. Barham, and R. Neugebauer.
Xen and the Art of Virtualization.
In Proceedings of the ACM Symposium on Operating Systems Principles, October 2003.

5
R. Figueiredo, P. A. Dinda, and J. Fortes.
Resource virtualization renaissance.
IEEE Computer, 38(5):28-31, 2005.

6
K. Fraser, S. Hand, R. Neugebauer, I. Pratt, A. Warfield, and M. Williamson.
Safe Hardware Access with the Xen Virtual Machine Monitor.
In Proceedings of the OASIS ASPLOS Workshop, 2004.

7
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, and Dan Boneh.
Terra: a Virtual Machine-based Platform for Trusted Computing.
In Proceedings of the Symposium on Operating Systems Principles (SOSP), pages 193-206, 2003.

8
R. P. Goldberg.
Survey of Virtual Machine Research.
IEEE Computer Magazine, 7(6):34-45, 1974.

9
Applied Data Security Group.
What is TrustedGRUB, https://www.prosec.ruhr-uni-bochum.de/trustedgrub.html.

10
Trusted Computing Group.
TCG TPM Specification Version 1.2 - Part 1 Design Principles, 2005.

11
Trusted Computing Group.
TCG TPM Specification Version 1.2 - Part 3 Commands, 2005.

12
IBM.
IBM eServer x366.
https://www-03.ibm.com/servers/eserver/xseries/x366.html.

13
IBM.
Integrity Measurement Architecture for Linux.
https://www.sourceforge.net/projects/linux-ima.

14
IBM.
PHYP: Converged POWER Hypervisor Firmware for pSeries and iSeries.
https://www-1.ibm.com/servers/enable/site/ peducation/abstracts/abs2bb2.html.

15
IBM.
Secure Coprocessing.
https://www.research.ibm.com/secure systemsdepartment/projects/scop/index.html.

16
IBM.
Trusted Virtual Data Center.
https://domino.research.ibm.com/comm/researchprojects.nsf/ pages/ssdtrustedvirtualdatacenter.index.html.

17
U. Kühn, K. Kursawe, S. Lucks, A. Sadeghi, and C. Stüble.
Secure data management in trusted computing.
In Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2005), 2005.

18
H. Maruyama, F. Seliger, N. Nagaratnam, T. Ebringer, S. Munetoh, S. Yoshihama, and T. Nakamura.
Trusted platform on demand.
Technical Report RT0564, IBM, February 2004.

19
National Institute of Standards and Technology.
Secure Hash Standard (SHA-1).
Federal Information Processing Standards Publication 180-1, 1993.

20
R. Sailer, T. Jaeger, E. Valdez, R. Cáceres, R. Perez, S. Berger, J. Griffin, and L. van Doorn.
Building a MAC-based security architecture for the Xen opensource hypervisor.
In Proceedings of the Annual Computer Security Applications Conference (ACSAC), December 2005.

21
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn.
Design and implementation of a TCG-based integrity measurement architecture.
In Proceedings of the USENIX Security Symposium, 2004.

22
The Xen Team.
Xen Interface Manual - Xen v3.0 for x86.

23
Trusted Computing Group.
https://www.trustedcomputinggroup.org.

24
Trusted Computing Group.
TCG PC Specific Implementation Specification, 2003.

25
Trusted Computing Group.
TCG Software Stack (TSS) Specification - Version 1.10 Golden, 2003.

26
VMware, Inc.
https://www.vmware.com.

27
Xensource.
Xen Open-Source Hypervisor.
https://www.xensource.com/products/downloads.


root 2006-05-12