Implementing an untrusted operating system on trusted hardware.
David LieChandramohan A. ThekkathMark HorowitzPublished in: SOSP (2003)
Keyphrases
- operating system
- computer systems
- memory management
- windows xp
- trusted computing
- virtual memory
- application level
- address space
- operating environment
- low cost
- processor core
- virtual machine
- third party
- microsoft windows
- protection scheme
- data processing
- distributed systems
- protection schemes
- computing systems
- computing power
- privacy preserving
- data mining
- high end
- parallel algorithm
- multi core processors
- computing platform
- security policies
- hardware implementation
- distributed environment
- access control
- database
- red hat