Sheehy et al., 2007 - Google Patents
Attestation: evidence and trustSheehy et al., 2007
View PDF- Document ID
- 499871118343367552
- Author
- Sheehy J
- Coker G
- Guttman J
- Loscocco P
- Herzog A
- Millen J
- Monk L
- Ramsdell J
- Sniffen B
- Publication year
- Publication venue
- Mitre Technical Paper
External Links
Snippet
Attestation is the activity of making a claim about properties of a target by supplying evidence to an appraiser. An open-ended framework for attestation is desirable for safe support to sensitive or highvalue activities on heterogeneous networks. We identify five …
- 230000000694 effects 0 abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/52—Programme synchronisation; Mutual exclusion, e.g. by means of semaphores; Contention for resources among tasks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/30—Arrangements for executing machine-instructions, e.g. instruction decode
- G06F9/38—Concurrent instruction execution, e.g. pipeline, look ahead
- G06F9/3836—Instruction issuing, e.g. dynamic instruction scheduling, out of order instruction execution
- G06F9/3842—Speculative instruction execution
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Coker et al. | Principles of remote attestation | |
| US9276905B2 (en) | Attestation architecture and system | |
| US10685119B2 (en) | Trusted malware scanning | |
| US9940456B2 (en) | Using trusted execution environments for security of code and data | |
| Ménétrey et al. | An exploratory study of attestation mechanisms for trusted execution environments | |
| Coker et al. | Attestation: Evidence and trust | |
| Brown et al. | Trusted platform-as-a-service: a foundation for trustworthy cloud-hosted applications | |
| Lauer et al. | Hypervisor-based attestation of virtual environments | |
| Larsen et al. | Cloudvaults: Integrating trust extensions into system integrity verification for cloud-based environments | |
| Valadares et al. | Confidential computing in cloud/fog-based Internet of Things scenarios | |
| Arfaoui et al. | A cryptographic view of deep-attestation, or how to do provably-secure layer-linking | |
| Aslam et al. | Security and trust preserving inter‐and intra‐cloud VM migrations | |
| Petz et al. | Design and formal verification of a copland-based attestation protocol | |
| Sailer et al. | The role of TPM in enterprise security | |
| Østergaard et al. | ERAMO: Effective remote attestation through memory offloading | |
| Sheehy et al. | Attestation: evidence and trust | |
| Baiardi et al. | Measuring semantic integrity for remote attestation | |
| Alam et al. | Behavioral attestation for web services (BA4WS) | |
| Pendergrass et al. | Maat: a platform service for measurement and attestation | |
| Guttman et al. | Attestation: Evidence and Trust | |
| Yang et al. | Enhancing the Availability and Security of Attestation Scheme for Multiparty-involved DLaaS: A Circular Approach | |
| Manferdelli et al. | The cloudproxy tao for trusted computing | |
| Eisoldt et al. | SoK: A cloudy view on trust relationships of CVMs--How Confidential Virtual Machines are falling short in Public Cloud | |
| Bravi | Use of Trusted Computing techniques to counteract Cybersecurity attacks in Critical Infrastructures | |
| Cui | DevSecOps of Containerization |