{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:35:51Z","timestamp":1725564951313},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540223795"},{"type":"electronic","value":"9783540278009"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-27800-9_8","type":"book-chapter","created":{"date-parts":[[2010,9,5]],"date-time":"2010-09-05T19:00:38Z","timestamp":1283713238000},"page":"86-97","source":"Crossref","is-referenced-by-count":27,"title":["NGSCB: A Trusted Open System"],"prefix":"10.1007","author":[{"given":"Marcus","family":"Peinado","sequence":"first","affiliation":[]},{"given":"Yuqun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Paul","family":"England","sequence":"additional","affiliation":[]},{"given":"John","family":"Manferdelli","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M.: Trusted computing, trusted third parties and verified communications (2004)","DOI":"10.1007\/1-4020-8143-X_19"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Abadi, M., Wobber, T.: A logical account of NGSCB (2004)","DOI":"10.1007\/978-3-540-30232-2_1"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: Proceedings of the 19th Symposium on Operating Systems Principles (SOSP 2003), pp. 164\u2013177 (2003)","DOI":"10.1145\/945445.945462"},{"key":"8_CR4","unstructured":"Bell, D., La Padula, L.: Secure computer systems: Mathematical foundations and model. Technical Report M74-244, Mitre Corporation (1975)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Berson, T., Barksdale, G.: KSOS \u2013 a development methodology for a secure operating system. In: Proceedings of the 1979 AFIPS National Computer Conference, pp. 365\u2013371 (1979)","DOI":"10.1109\/MARK.1979.8817195"},{"key":"8_CR6","unstructured":"Chen, Y., England, P., Peinado, M., Willman, B.: High assurance computing on open hardware architectures. Technical Report MSR-TR-2003-20, Microsoft Research (2003)"},{"key":"8_CR7","unstructured":"DOD, Washington, DC. Department of defense trusted computer system evaluation criteria, DOD 5200.28-STD (December 1985)"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/3-540-45450-0_27","volume-title":"Information Security and Privacy","author":"P. England","year":"2002","unstructured":"England, P., Peinado, M.: Authenticated operation of open computing devices. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol.\u00a02384, pp. 346\u2013361. Springer, Heidelberg (2002)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Engler, D., Kaashoek, M.F., O\u2019Toole Jr., J.: Exokernel: An operating system architecture for application-level resource management. In: Proceedings of the 15th Symposium on Operating Systems Principles (15th SOSP 1995), Operating Systems Review, pp. 251\u2013266 (1995)","DOI":"10.1145\/224057.224076"},{"key":"8_CR10","unstructured":"eTestingLab. Business Winstone 2002 and Multimedia Content Creation Winstone 2002 (2002), http:\/\/www.winstone.com"},{"key":"8_CR11","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MC.1983.1654440","volume":"16","author":"L. Fraim","year":"1983","unstructured":"Fraim, L.: Scomp: A solution to the multilevel security problem. IEEE Computer\u00a016, 26\u201334 (1983)","journal-title":"IEEE Computer"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra:A virtual-machine based platform for trusted computing. In: Proceedings of the 19th Symposium on Operating Systems Principles, SOSP 2003 (2003)","DOI":"10.1145\/945445.945464"},{"key":"8_CR13","unstructured":"Garfinkel, T., Rosenblum, M., Boneh, D.: A broader vision of trusted computing. In: Proceedings of the 9th USENIX Workshop on Hot Topics in Operating Systems, HotOS-IX (2003)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"H\u00e4rtig, H., Hohmuth, M., Liedtke, J., Sch\u00f6nberg, S., Wolter, J.: The performance of \u03bc-kernelbased systems. In: Proceedings of the 16th Symposium on Operating Systems Principles, SOSP 1997 (1997)","DOI":"10.1145\/268998.266660"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"H\u00e4rtig, H.: Security architectures revisited (2002)","DOI":"10.1145\/1133373.1133376"},{"key":"8_CR16","unstructured":"http:\/\/research.microsoft.com\/research\/pubs\/"},{"issue":"11","key":"8_CR17","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/32.106971","volume":"17","author":"P. Karger","year":"1991","unstructured":"Karger, P., Zurko, M., Bonin, D., Mason, A., Kahn, C.: A restrospective on the VAXVMM security kernel. IEEE Transactions on Software Engineering\u00a017(11), 1147\u20131165 (1991)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"1","key":"8_CR18","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/775265.775268","volume":"8","author":"B. Lampson","year":"1974","unstructured":"Lampson, B.: Protection. ACM Operating Systems Review\u00a08(1), 18\u201324 (1974)","journal-title":"ACM Operating Systems Review"},{"key":"8_CR19","unstructured":"Leslie, B., Heiser, G.: Towards untrusted device drivers. Technical Report UNSW-CSETR- 0303, University of New South Wales (2003)"},{"key":"8_CR20","unstructured":"NIST. Common Criteria for Information Technology Security Evaluation, version 2.1 edition (August 1999)"},{"issue":"2","key":"8_CR21","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1147\/sj.112.0099","volume":"11","author":"R. Parmelee","year":"1972","unstructured":"Parmelee, R., Peterson, T., Tillman, C., Hatfield, D.: Virtual storage and virtual machine concepts. IBM Systems Journal\u00a011(2), 99\u2013130 (1972)","journal-title":"IBM Systems Journal"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B., Riordan, J., St\u00fcble, C., Waidner, M., Weber, A.: The Perseus system architecture. Technical report, IBM Research Division (2001)","DOI":"10.1007\/978-3-663-05918-9_1"},{"issue":"7","key":"8_CR23","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1145\/361011.361073","volume":"17","author":"G. Popek","year":"1974","unstructured":"Popek, G., Goldberg, R.: Formal requirements for virtualizable third generation architectures. Communications of the ACM\u00a017(7), 412\u2013421 (1974)","journal-title":"Communications of the ACM"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Robin, J., Irvine, C.: Analysis of the Intel Pentium\u2019s ability to support a secure virtual machine monitor. In: Proceedings of the 9th USENIX Security Symposium (SECURITY 2000), pp. 129\u2013144. The USENIX Association (2000)","DOI":"10.21236\/ADA423654"},{"key":"8_CR25","unstructured":"Schell, R., Tao, T., Heckman, M.: Designing the GEMSOS security kernel for security and performance. In: Proceedings of the 8th DoD\/NBS Computer Security Conference, pp. 108\u2013119 (1985)"},{"key":"8_CR26","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1145\/319151.319163","volume-title":"Proceedings of the 17th Symposium on Operating Systems Principles (SOSP 1999), Operating Systems Review","author":"J. Shapiro","year":"1999","unstructured":"Shapiro, J., Smith, J., Faber, D.: EROS: a fast capability system. In: Proceedings of the 17th Symposium on Operating Systems Principles (SOSP 1999), Operating Systems Review, pp. 170\u2013185. ACM Press, New York (1999)"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Whitaker, A., Shaw, M., Gribble, S.: Scale and performance in the Denali isolation kernel. In: Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI 2002), pp. 195\u2013209 (2002)","DOI":"10.1145\/1060289.1060308"},{"key":"8_CR28","unstructured":"Wright, C., Cowan, C., Smalley, S., Morris, J., Kroah-Hartman, G.: Linux security modules: General security support in the Linux kernel. In: Proceedings of the 11th USENIX Security Symposium (2002)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-27800-9_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,2]],"date-time":"2021-05-02T23:26:50Z","timestamp":1619998010000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-27800-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540223795","9783540278009"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-27800-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}