Overshadow
Top Cited Papers
- 1 March 2008
- proceedings article
- Published by Association for Computing Machinery (ACM)
- Vol. 36 (1) , 2-13
- https://doi.org/10.1145/1346281.1346284
Abstract
No abstract availableKeywords
This publication has 17 references indexed in Scilit:
- Hardware-rooted trust for secure key management and transient trustPublished by Association for Computing Machinery (ACM) ,2007
- A comparison of software and hardware techniques for x86 virtualizationPublished by Association for Computing Machinery (ACM) ,2006
- IntelŴVirtualization Technology: Hardware Support for Efficient Processor VirtualizationIntel Technology Journal, 2006
- Reducing TCB complexity for security-sensitive applicationsPublished by Association for Computing Machinery (ACM) ,2006
- Implementing an untrusted operating system on trusted hardwarePublished by Association for Computing Machinery (ACM) ,2003
- Xen and the art of virtualizationPublished by Association for Computing Machinery (ACM) ,2003
- Cover feature - A trusted open platformComputer, 2003
- Building the IBM 4758 secure coprocessorComputer, 2001
- DiscoPublished by Association for Computing Machinery (ACM) ,1997
- A hardware architecture for implementing protection ringsCommunications of the ACM, 1972