A secure run of an untrusted program code in the PIVO system

被引:0
|
作者
Varen zagon nepreverjene programske kode v sistemu PIVO [1 ]
机构
[1] Rojec, Ziga
来源
| 1600年 / Electrotechnical Society of Slovenia卷 / 88期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:54 / 60
相关论文
共 50 条
  • [1] A secure run of an untrusted program code in the PIVO system
    Rojec, Ziga
    ELEKTROTEHNISKI VESTNIK, 2021, 88 (1-2): : 54 - 60
  • [2] A secure virtual execution environment for untrusted code
    Wen, Yan
    Wang, Huaimin
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 156 - 167
  • [3] Secure composition of untrusted code: Wrappers and causality types
    Sewell, P
    Vitek, J
    13TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2000, : 269 - 284
  • [4] A secure jailing system for confining untrusted applications
    van 't Noordende, Guido
    Balogh, Adam
    Hofman, Rutger
    Brazier, Frances M. T.
    Tanenbaum, Andrew S.
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 414 - +
  • [5] InkTag: Secure Applications on an Untrusted Operating System
    Hofmann, Owen S.
    Kim, Sangman
    Dunn, Alan M.
    Lee, Michael Z.
    Witchel, Emmett
    ACM SIGPLAN NOTICES, 2013, 48 (04) : 265 - 278
  • [6] A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory
    Seitzer, Maximilian
    Gruhn, Michael
    Mueller, Tilo
    COMPUTER SECURITY - ESORICS 2015, PT II, 2015, 9327 : 376 - 395
  • [7] Cerise: Program Verification on a Capability Machine in the Presence of Untrusted Code
    Georges, Aina Linn
    Gueneau, Armael
    Van Strydonck, Thomas
    Timany, Amin
    Trieu, Alix
    Devriese, Dominique
    Birkedal, Lars
    JOURNAL OF THE ACM, 2024, 71 (01)
  • [8] Secure fingerprint authentication system on an untrusted computing environment
    Chung, Y
    Moon, D
    Kim, T
    Pan, S
    TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, 2005, 3592 : 299 - 310
  • [9] A Secure Space-Time Code for Asynchronous Cooperative Communication Systems with Untrusted Relays
    Gao, Zhenzhen
    Liao, Xuewen
    Sun, Xiaodong
    Zhu, Shihua
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 4192 - 4196
  • [10] A secure online image trading system for untrusted cloud environments
    Munadi, Khairul
    Arnia, Fitri
    Syaryadhi, Mohd
    Fujiyoshi, Masaaki
    Kiya, Hitoshi
    SPRINGERPLUS, 2015, 4