When IMA/EVM collides with systems administration

  • Rossano P. Pinto UNICAMP
  • Rodrigo A. A. Pierini UNICAMP
  • Caio Teixeira UNICAMP
  • Felipe J. A. Rampazzo UNICAMP
  • Diego S. Pereira IFRN
  • Roger Immich UFRN
  • Christian E. Rothenberg UNICAMP
  • Marco A. A. Henriques UNICAMP

Resumo


This article does not have an abstract.

Referências

Cohen, J. C. and Acharya, S. (2012). Incorporating hardware trust mechanisms in apache hadoop... In 2012 IEEE Globecom Workshops, pages 769–774.

IBM (2023). IMA Policy. [link]. Accessed: Jun 25, 2025.

Linux M. (2008). IMA Policy. [link]. Accessed: April 14, 2025.

Ozga, W., Quoc, D. L., and Fetzer, C. (2020). A practical approach for updating an integrity-enforced operating system. In Proceedings of the 21st International Middleware Conference, Middleware ’20, page 311–325, New York, NY, USA. ACM.

Yocto (2021). Ima/evm integration. [link]. Accessed June 2025.
Publicado
01/09/2025
PINTO, Rossano P.; PIERINI, Rodrigo A. A.; TEIXEIRA, Caio; RAMPAZZO, Felipe J. A.; PEREIRA, Diego S.; IMMICH, Roger; ROTHENBERG, Christian E.; HENRIQUES, Marco A. A.. When IMA/EVM collides with systems administration. In: RESUMOS EXPANDIDOS - SIMPÓSIO BRASILEIRO DE CIBERSEGURANÇA (SBSEG), 25. , 2025, Foz do Iguaçu/PR. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2025 . p. 348-349. DOI: https://doi.org/10.5753/sbseg_estendido.2025.11410.

Artigos mais lidos do(s) mesmo(s) autor(es)

1 2 3 4 > >>