-
1
المؤلفون: Peter Loscocco, Paul D. Rowe, Perry Alexander, Ian D. Kretz, Sarah C. Helble, John D. Ramsdell
المصدر: ACM Transactions on Privacy and Security. 24:1-23
مصطلحات موضوعية: General Computer Science, Computer science, media_common.quotation_subject, Message passing, Computer security, computer.software_genre, Variety (cybernetics), Negotiation, Order (exchange), Flexible Mechanisms, Evidence collection, Safety, Risk, Reliability and Quality, computer, media_common
-
2
المؤلفون: Sarah C. Helble, Peter Loscocco, J. Aaron Pendergrass, Nathan Hull, Kathleen McGill, Mark Thober, John Clemens, Machon Gregory
المصدر: MILCOM
مصطلحات موضوعية: Instruction set, Software, business.industry, Computer science, System integrity, Component (UML), Key (cryptography), Operating system, Malware, State (computer science), business, computer.software_genre, computer
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::ece0f19796f330a71b4496a63bc28126
https://doi.org/10.1109/milcom47813.2019.9020783 -
3
المؤلفون: John Clemens, Sarah C. Helble, J. Aaron Pcnderarass, Peter Loscocco
المصدر: MILCOM
مصطلحات موضوعية: 021110 strategic, defence & security studies, Service (systems architecture), Authentication, business.industry, Computer science, 0211 other engineering and technologies, Integrity measurement, 02 engineering and technology, Task (project management), Software, Network Access Control, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Software engineering, business, Software integrity
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::1c6f0c7b32767ad71765c019bea74608
https://doi.org/10.1109/milcom.2018.8599735 -
4
المؤلفون: George Coker, Peter Loscocco, Lee Pike, Perry Alexander
المصدر: ACM Transactions on Information and System Security. 18:1-25
مصطلحات موضوعية: Model checking, General Computer Science, business.industry, Computer science, Distributed computing, Access control, Hypervisor, computer.software_genre, Virtualization, Mandatory access control, Stateful firewall, Virtual machine, Role-based access control, Safety, Risk, Reliability and Quality, business, computer
-
5
المؤلفون: John D. Ramsdell, Brian T. Sniffen, Justin Sheehy, Peter Loscocco, Amy L. Herzog, Jonathan K. Millen, George Coker, Ariel Segall, Joshua D. Guttman, Brian O'Hanlon
المصدر: International Journal of Information Security. 10:63-81
مصطلحات موضوعية: Hardware security module, Software_OPERATINGSYSTEMS, Computer Networks and Communications, Computer science, business.industry, InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS, Cryptography, Cryptographic protocol, Computer security, computer.software_genre, ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS, Trustworthiness, Direct Anonymous Attestation, Architecture, Safety, Risk, Reliability and Quality, business, Computer communication networks, computer, Software, Information Systems
-
6
المؤلفون: Jun Zhu, Peter Loscocco, Mihir Nanavati, Patrick Colp, Tim Deegan, Andrew Warfield, William Aiello, George Coker
المصدر: SOSP
مصطلحات موضوعية: Software_OPERATINGSYSTEMS, Computer science, business.industry, Hardware virtualization, Principle of least privilege, Cloud computing, Hypervisor, Attack surface, Virtualization, computer.software_genre, Storage hypervisor, Trusted computing base, Operating system, business, computer
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::1de027338481969f0d6bef8ddcdc2743
https://doi.org/10.1145/2043556.2043575 -
7
المؤلفون: Brian T. Sniffen, Justin Sheehy, Peter Loscocco, George Coker, Joshua D. Guttman
المصدر: Information and Communications Security ISBN: 9783540886242
ICICSمصطلحات موضوعية: Software_OPERATINGSYSTEMS, business.industry, Computer science, InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS, Computer programming, Hypervisor, Cryptography, Cryptographic protocol, computer.software_genre, Computer security, ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS, Virtual machine, Direct Anonymous Attestation, Trusted Platform Module, Architecture, business, computer
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::38b110d9b491d6b95dc306fe9f251871
https://doi.org/10.1007/978-3-540-88625-9_1 -
8
المصدر: STC
مصطلحات موضوعية: Function pointer, Computer science, business.industry, Kernel (statistics), Embedded system, Hash function, Code (cryptography), Integrity measurement, Linux kernel, business, System monitoring, Base (topology)
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::f110a94183201e847fec4c1b6c683c83
https://doi.org/10.1145/1314354.1314362 -
9
المؤلفون: Jay Lepreau, Stephen Smalley, David G. Andersen, Peter Loscocco, Ray Spencer, Mike Hibler
المصدر: USENIX Security Symposium
مصطلحات موضوعية: FOS: Computer and information sciences, Computer science, Computer security model, Computer security, computer.software_genre, Security policy, Security testing, Logical security, Distributed System Security Architecture, Security service, Security convergence, Network security policy, 89999 Information and Computing Sciences not elsewhere classified, computer
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e333d2eab067069e3f587caecfff4a6a
-
10
المؤلفون: D.M. Johnson, R.J. Watro, W.R. Kutz, Peter Loscocco
المصدر: ACSAC
مصطلحات موضوعية: Computer science, business.industry, Computer security model, Communications security, Computer security, computer.software_genre, Security information and event management, Security service, Software security assurance, Network Access Control, Security convergence, Network security policy, business, computer, Computer network
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::05702d59dede17e9825d56fefda1c96d
https://doi.org/10.1109/csac.1992.228221