Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Elaine R. Palmer"'
Autor:
Elaine R. Palmer, Kenneth Alan Goldman, Bharata Bhasker Rao, Hani Jamjoom, Lawrence Roy, Janani Janakirman, Brad Frey, Laurent Dufour, Ramachandra N. Pai, John M. Ludden, Cathy May, Guerney D. H. Hunt, Jeffrey A. Stuecheli, Wendel Glenn Voigt, Enriquillo Valdez, Sukadev Bhattiprolu, Mohit Kapur, Rick Boivie, William A. Starke, Paul Mackerras, Michael V. Le, Ryan P. Grimm
Publikováno v:
EuroSys
This paper presents Protected Execution Facility (PEF), a virtual machine-based Trusted Execution Environment (TEE) for confidential computing on Power ISA. PEF enables protected secure virtual machines (SVMs). Like other TEEs, PEF verifies the SVM p
Publikováno v:
IEEE Security & Privacy Magazine. 9:22-30
This article features lessons learned in designing, developing, and testing features for a high-assurance smart card operating system. In particular, this paper describes software design, development, and testing process, and the advantages reaped fr
Publikováno v:
ACM SIGOPS Operating Systems Review. 42:32-39
The Caernarvon operating system was developed to demonstrate that a high assurance system for smart cards was technically feasible and commercially viable. The entire system has been designed to be evaluated under the Common Criteria at EAL7, the hig
Autor:
Kirk A. Beaty, Mark F. Hulber, Elaine R. Palmer, Vanessa V. Michelini, Jenny M. Chow, Koushik K. Das, Renato L. F. Cunha, Ashish Kundu
Publikováno v:
IBM Journal of Research and Development. 60:4:1-4:13
Autor:
David C. Toll, Suzanne McIntosh, Elaine R. Palmer, Jonathan W. Edwards, Samuel M. Weber, Paul A. Karger
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783642145766
Financial Cryptography
Financial Cryptography
Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::726e56f328bc126896cce845c0be051d
https://doi.org/10.1007/978-3-642-14577-3_7
https://doi.org/10.1007/978-3-642-14577-3_7
Autor:
Suresh Chari, Josyula R. Rao, Tal Rabin, Vincenzo V. DiLuoffo, Pankaj Rohotgi, Elaine R. Palmer, Paul A. Karger, Michael Steiner, David C. Toll, Helmut Scherzer
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642125096
CARDIS
CARDIS
This paper describes the design of the random number generator (RNG) in the Caernarvon high assurance smart card operating system. Since it is used in the generation of cryptographic keys and other sensitive materials, the RNG has a number of stringe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cbf0d7a804f2c60caad38e23e84d8a5f
https://doi.org/10.1007/978-3-642-12510-2_5
https://doi.org/10.1007/978-3-642-12510-2_5
Autor:
Paul A. Karger, David C. Toll, Matthew Kaplan, Amitkumar M. Paradkar, Sam Weber, Suzanne McIntosh, Elaine R. Palmer
Publikováno v:
ISSRE
In this paper, we describe results of a case study to establish the feasibility of deriving mappings between an abstract user level specification and the code elements in a concrete implementation of a highly secure smart card operating system. Such
Publikováno v:
Financial Cryptography ISBN: 9783540649519
Financial Cryptography
Financial Cryptography
Unsecure computational environments threaten many financial cryptography implementations, and other sensitive computation. High-performance secure coprocessors can address these threats. However, using this technology for practical security solutions
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fec061eade3eadd90f93afddc9bd4a24
https://doi.org/10.1007/bfb0055474
https://doi.org/10.1007/bfb0055474
Autor:
Mary Ellen Zurko, Roger R. Schell, Charles Campbell Palmer, David R. Safford, Carl E. Landwehr, S. Lipner, Elaine R. Palmer
Publikováno v:
IEEE Security & Privacy Magazine. 8:5-5
V.S. Naipaul's latest book cites an African saying: "When an old person dies, we say a library has burnt down." Paul Karger was far from old, and he had not only an encyclopedic (and bibliographic) knowledge of our field but also the ability to apply
Publikováno v:
Journal of the Franklin Institute. 326:83-92
The state transition table method of finite state automata theory has been used to automate causality assignment in bond graphs. The state transition table consists of rows for each type of node in the bond graph: E, F, R, C, I, T, G, 0- and 1-juncti