TOCTOU, Traps, and Trusted Computing
- 12 August 2008
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 7 references indexed in Scilit:
- OvershadowPublished by Association for Computing Machinery (ACM) ,2008
- SecVisorPublished by Association for Computing Machinery (ACM) ,2007
- Pastures: Towards Usable Security Policy EngineeringPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- BIND: A Fine-Grained Attestation Service for Secure Distributed SystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- CA-in-a-BoxLecture Notes in Computer Science, 2005
- Concepts of trusted computingPublished by Institution of Engineering and Technology (IET) ,2005
- The kernel craze [computer security]IEEE Security & Privacy, 2004