References
- R. Richardson, CSI Computer Crime and Security Survey 2010/ 2011, New York, NY: Computer Security Institute, 2011.
- Citrix Systems Inc., "XenDesktop," http://www.citrix.com/xendesktop.
- VMware Inc., "VMware View 5," http://www.vmware.com/products/ view/overview.html.
- Microsoft, "Windows Server 2008R2 Remote Desktop Services Features," http://www.microsoft.com/windowsserver2008/en/us/rdsremotefx. aspx.
- Boca Research Inc., Citrix ICA Technology Brief, Boca Raton, FL: Boca Research Inc., 1999.
- VMware Inc., VMWare View 4 with PCoIP, 2009.
- Trusted Computing Group, "Trusted Platform Module," http:// www.trustedcomputinggroup.org/developers/ trusted_platform_module.
- B. Kauer, "OSLO: improving the security of trusted computing," Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, Boston, MA, 2007, pp. 1-9.
- R. Sailer, X. Zhang, T. Jaeger, and L. Van Doorn, "Design and implementation of a TCG-based integrity measurement architecture," Proceedings of the 13th Conference on USENIX Security Symposium, San Diego, CA, 2004, pp. 16-16.
- J. Choi, W. Park, and C. Park, "A framework of secure access to iscsi network storage based on TPM," Proceedings of the 2009 Fall Conference on Korean Institute of Information Scientists and Engineers, Seoul, Korea, 2009, pp. 5-9.
- Trusted Computing Group, http://www.trustedcomputinggroup.org/.
- "Trusted third party," http://en.wikipedia.org/wiki/Trusted_third_party.
- T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, "Terra: a virtual machine-based platform for trusted computing," ACM SIGOPS Operating Systems Review, vol. 37, no. 5, pp. 193-206, 2003. https://doi.org/10.1145/1165389.945464
- VMware Inc., VMware View 3: Virtual Desktop Infrastructure White Paper. Palo Alto, CA: VMware Inc., 2008.
- Trusted Computing Group, TCG Mobile Trusted Module Specification Version 0.9 Revision 1, Beaverton, OR: Trusted Computing Group, 2006.
- J. E. Ekberg and M. Kylanpaa, Mobile Trusted Module (MTM): An Introduction, Helsinki, Finland: Nokia Research Center, 2007.
- A. Kivity, Y. Kamay, D. Laor, U. Lublin, and A. Liguori, "kvm: the Linux virtual machine monitor," Proceedings of the Linux Symposium, Ottawa, Canada, 2007, pp. 225-230.
- "GRUB TCG Patch to support Trusted Boot," http://trousers. sourceforge.net/grub.html.
- H. Maruyama, F. Seliger, N. Nagaratnam, T. Ebringer, S. Munetho, S. Yoshihama, and T. Nakamura, Trusted Platform on Demand (TPod). Research Report RT0564, Kanagawa, Japan: IBM Japan, Ltd., 2004.
- F. Bellard, "QEMU, a fast and portable dynamic translator," Proceedings of the Annual Conference on USENIX Annual Technical Conference, Anaheim, CA, 2005, pp. 41-46.
- I. Habib, "Virtualization with KVM," Linux Journal, no. 166, p. 8, 2008.
- Z. Mahkovec, "Bootchart," http://www.bootchart.org/.
- J. Sievert, "Iometer: The I/O Performance Analysis Tool for Servers," http://www.intel.com/design/servers/devtools/iometer/index.htm.
Cited by
- A Survey on Intrusion-Tolerant System vol.7, pp.4, 2013, https://doi.org/10.5626/JCSE.2013.7.4.242