Abstract is missing.
- System security, platform security and usabilityPaul C. van Oorschot. 1-2 [doi]
- The road to trustworthy systemsGernot Heiser, June Andronick, Kevin Elphinstone, Gerwin Klein, Ihor Kuz, Leonid Ryzhyk. 3-10 [doi]
- Using hypervisors to secure commodity operating systemsDavid Lie, Lionel Litty. 11-20 [doi]
- Implementing an application-specific credential platform using late-launched mobile trusted moduleSven Bugiel, Jan-Erik Ekberg. 21-30 [doi]
- Towards customizable, application specific mobile trusted modulesKurt Dietrich, Johannes Winter. 31-40 [doi]
- Small, stupid, and scalable: secure computing with faerieplayAlexander Iliev, Sean W. Smith. 41-52 [doi]
- Hardware intrinsic security from D flip-flopsVincent van der Leest, Geert Jan Schrijen, Helena Handschuh, Pim Tuyls. 53-62 [doi]
- Trusted virtual containers on demandKatelin A. Bailey, Sean W. Smith. 63-72 [doi]
- Scalable integrity monitoring in virtualized environmentsKenneth A. Goldman, Reiner Sailer, Dimitrios E. Pendarakis, Deepa Srinivasan. 73-78 [doi]
- Separating hypervisor trusted computing base supported by hardwareCarl Gebhardt, Chris I. Dalton, Allan Tomlinson. 79-84 [doi]
- The diversity of TPMs and its effects on development: a case study of integrating the TPM into OpenSolarisAnna Shubina, Sergey Bratus, Wyllys Ingersol, Sean W. Smith. 85-90 [doi]
- Trusted virtual domains on OpenSolaris: usable secure desktop environmentsHans Löhr, Thomas Pöppelmann, Johannes Rave, Martin Steegmanns, Marcel Winandy. 91-96 [doi]