scispace - formally typeset
R

Ronald Perez

Researcher at IBM

Publications -  56
Citations -  3455

Ronald Perez is an academic researcher from IBM. The author has contributed to research in topics: Virtual machine & Hypervisor. The author has an hindex of 29, co-authored 55 publications receiving 3398 citations. Previous affiliations of Ronald Perez include Brigham and Women's Hospital & Cornell University.

Papers
More filters
Proceedings Article

vTPM: virtualizing the trusted platform module

TL;DR: The design and implementation of a system that enables trusted computing for an unlimited number of virtual machines on a single hardware platform and four designs for certificate chains to link the virtual TPM to a hardware TPM are presented, with security vs. efficiency trade-offs based on threat models.
Proceedings ArticleDOI

Building a MAC-based security architecture for the Xen open-source hypervisor

TL;DR: The sHype hypervisor security architecture as mentioned in this paper enforces strong isolation at the granularity of a virtual machine, thus providing a robust foundation on which higher software layers can enact finer-grained controls.
Journal ArticleDOI

Building the IBM 4758 secure coprocessor

TL;DR: The 4758 is a lifetime-secure tamper-responding device, a multipurpose programmable device based on a 99-MHz 486 CPU internal environment, with a real operating system, a C language development environment and relatively high-speed cryptography.
Journal ArticleDOI

Survey of somatic mutations in tuberous sclerosis complex (TSC) hamartomas suggests different genetic mechanisms for pathogenesis of TSC lesions.

TL;DR: Evidence is provided that, in both TSC1 and TSC2, somatic mutations resulting in the loss of wild-type alleles may not be necessary in some tumor types-and that other mechanisms may contribute to tumorigenesis in this setting.
Proceedings ArticleDOI

Framework for security and privacy in automotive telematics

TL;DR: This paper proposes a new framework for data protection that is built on the foundation of privacy and security technologies, and provides secure environments for protected execution, which is essential to limiting data access to specific purposes.