[go: up one dir, main page]

Sheehy et al., 2007 - Google Patents

Attestation: evidence and trust

Sheehy et al., 2007

View PDF
Document ID
499871118343367552
Author
Sheehy J
Coker G
Guttman J
Loscocco P
Herzog A
Millen J
Monk L
Ramsdell J
Sniffen B
Publication year
Publication venue
Mitre Technical Paper

External Links

Snippet

Attestation is the activity of making a claim about properties of a target by supplying evidence to an appraiser. An open-ended framework for attestation is desirable for safe support to sensitive or highvalue activities on heterogeneous networks. We identify five …
Continue reading at evenmere.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/52Programme synchronisation; Mutual exclusion, e.g. by means of semaphores; Contention for resources among tasks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/30Arrangements for executing machine-instructions, e.g. instruction decode
    • G06F9/38Concurrent instruction execution, e.g. pipeline, look ahead
    • G06F9/3836Instruction issuing, e.g. dynamic instruction scheduling, out of order instruction execution
    • G06F9/3842Speculative instruction execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures

Similar Documents

Publication Publication Date Title
Coker et al. Principles of remote attestation
US9276905B2 (en) Attestation architecture and system
US10685119B2 (en) Trusted malware scanning
US9940456B2 (en) Using trusted execution environments for security of code and data
Ménétrey et al. An exploratory study of attestation mechanisms for trusted execution environments
Coker et al. Attestation: Evidence and trust
Brown et al. Trusted platform-as-a-service: a foundation for trustworthy cloud-hosted applications
Lauer et al. Hypervisor-based attestation of virtual environments
Larsen et al. Cloudvaults: Integrating trust extensions into system integrity verification for cloud-based environments
Valadares et al. Confidential computing in cloud/fog-based Internet of Things scenarios
Arfaoui et al. A cryptographic view of deep-attestation, or how to do provably-secure layer-linking
Aslam et al. Security and trust preserving inter‐and intra‐cloud VM migrations
Petz et al. Design and formal verification of a copland-based attestation protocol
Sailer et al. The role of TPM in enterprise security
Østergaard et al. ERAMO: Effective remote attestation through memory offloading
Sheehy et al. Attestation: evidence and trust
Baiardi et al. Measuring semantic integrity for remote attestation
Alam et al. Behavioral attestation for web services (BA4WS)
Pendergrass et al. Maat: a platform service for measurement and attestation
Guttman et al. Attestation: Evidence and Trust
Yang et al. Enhancing the Availability and Security of Attestation Scheme for Multiparty-involved DLaaS: A Circular Approach
Manferdelli et al. The cloudproxy tao for trusted computing
Eisoldt et al. SoK: A cloudy view on trust relationships of CVMs--How Confidential Virtual Machines are falling short in Public Cloud
Bravi Use of Trusted Computing techniques to counteract Cybersecurity attacks in Critical Infrastructures
Cui DevSecOps of Containerization