메뉴 건너뛰기




Volumn 3921 LNCS, Issue , 2006, Pages 111-125

Dynamic policy discovery with remote attestation

Author keywords

calculus; Code identity based access control; Key establishment; Next Generation Secure Computing Base; Policy establishment; Remote attestation

Indexed keywords

Π-CALCULUS; CODE-IDENTITY BASED ACCESS CONTROL; KEY ESTABLISHMENT; NEXT GENERATION SECURE COMPUTING BASE; POLICY ESTABLISHMENT; REMOTE ATTESTATION;

EID: 33745788969     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11690634_8     Document Type: Conference Paper
Times cited : (5)

References (51)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • M. Abadi. Secrecy by typing in security protocols. J. ACM, 46(5), 1999.
    • (1999) J. ACM , vol.46 , Issue.5
    • Abadi, M.1
  • 5
    • 0035035153 scopus 로고    scopus 로고
    • Mobile values, new names, and secure communication
    • M. Abadi and C. Fournet. Mobile values, new names, and secure communication. In POPL '01, 2001.
    • (2001) POPL '01
    • Abadi, M.1    Fournet, C.2
  • 7
    • 0033715532 scopus 로고    scopus 로고
    • Authentication primitives and their compilation
    • M. Abadi, C. Fournet, and G. Gonthier. Authentication primitives and their compilation. In POPL '00, 2000.
    • (2000) POPL '00
    • Abadi, M.1    Fournet, C.2    Gonthier, G.3
  • 8
    • 0037052276 scopus 로고    scopus 로고
    • Secure implementation of channel abstractions
    • M. Abadi, C. Fournet, and G. Gonthier. Secure implementation of channel abstractions. Inf. Comput., 174(1), 2002.
    • (2002) Inf. Comput. , vol.174 , Issue.1
    • Abadi, M.1    Fournet, C.2    Gonthier, G.3
  • 9
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1), 1999.
    • (1999) Information and Computation , vol.148 , Issue.1
    • Abadi, M.1    Gordon, A.D.2
  • 10
    • 33745766520 scopus 로고    scopus 로고
    • A logical account of NGSCB
    • M. Abadi and T. Wobber. A logical account of NGSCB. In FORTE '04, 2004.
    • (2004) FORTE '04
    • Abadi, M.1    Wobber, T.2
  • 14
    • 85008038596 scopus 로고    scopus 로고
    • Improving the TCPA specification
    • W. A. Arbaugh. Improving the TCPA specification. IEEE Computer, 2002.
    • (2002) IEEE Computer
    • Arbaugh, W.A.1
  • 16
    • 0025207607 scopus 로고
    • The chemical abstract machine
    • G. Berry and G. Boudol. The chemical abstract machine. In POPL '90, 1990.
    • (1990) POPL '90
    • Berry, G.1    Boudol, G.2
  • 18
    • 33745771399 scopus 로고    scopus 로고
    • Compositional analysis of authentication protocols
    • M. Bugliesi, R. Focardi, and M. Maffei. Compositional analysis of authentication protocols. In ESOP, 2004.
    • (2004) ESOP
    • Bugliesi, M.1    Focardi, R.2    Maffei, M.3
  • 19
    • 28144464907 scopus 로고    scopus 로고
    • Analysis of typed analyses of authentication protocols
    • M. Bugliesi, R. Focardi, and M. Maffei. Analysis of typed analyses of authentication protocols. In CSFW, 2005.
    • (2005) CSFW
    • Bugliesi, M.1    Focardi, R.2    Maffei, M.3
  • 20
    • 0030646118 scopus 로고    scopus 로고
    • Program fragments, linking, and modularization
    • L. Cardelli. Program fragments, linking, and modularization. In POPL '97, 1997.
    • (1997) POPL '97
    • Cardelli, L.1
  • 21
    • 33745794954 scopus 로고    scopus 로고
    • A type discipline for authorization policies
    • C. Fournet, A. Gordon, and S. Maffeis. A type discipline for authorization policies. In ESOP '05, 2005.
    • (2005) ESOP '05
    • Fournet, C.1    Gordon, A.2    Maffeis, S.3
  • 22
    • 0141863341 scopus 로고    scopus 로고
    • Authenticity by typing for security protocols
    • A. D. Gordon and A. S. A. Jeffrey. Authenticity by typing for security protocols. J. Computer Security, 11(4), 2003.
    • (2003) J. Computer Security , vol.11 , Issue.4
    • Gordon, A.D.1    Jeffrey, A.S.A.2
  • 23
    • 3042660681 scopus 로고    scopus 로고
    • Types and effects for asymmetric cryptographic protocols
    • A. D. Gordon and A. S. A. Jeffrey. Types and effects for asymmetric cryptographic protocols. J. Computer Security, 12(3/4), 2004.
    • (2004) J. Computer Security , vol.12 , Issue.3-4
    • Gordon, A.D.1    Jeffrey, A.S.A.2
  • 24
    • 27244435196 scopus 로고    scopus 로고
    • Secrecy despite compromise: Types, cryptography, and the pi-calculus
    • A. D. Gordon and A. S. A. Jeffrey. Secrecy despite compromise: Types, cryptography, and the pi-calculus. In CONCUR, 2005.
    • (2005) CONCUR
    • Gordon, A.D.1    Jeffrey, A.S.A.2
  • 26
    • 24644470511 scopus 로고    scopus 로고
    • Semantic remote attestation: A virtual machine directed approach to trusted computing
    • V. Haldar, D. Chandra, and M. Franz. Semantic remote attestation: A virtual machine directed approach to trusted computing. In USENIX VM, 2004.
    • (2004) USENIX VM
    • Haldar, V.1    Chandra, D.2    Franz, M.3
  • 27
    • 33745792638 scopus 로고    scopus 로고
    • Symmetric behavior-based trust: A new paradigm for internet computing
    • V. Haldar and M. Franz. Symmetric behavior-based trust: A new paradigm for internet computing. In New Security Paradigms Workshop, 2004.
    • (2004) New Security Paradigms Workshop
    • Haldar, V.1    Franz, M.2
  • 28
    • 0037170503 scopus 로고    scopus 로고
    • Resource access control in systems of mobile agents
    • M. Hennessy and J. Riely. Resource access control in systems of mobile agents. Information and Computation, 173, 2002.
    • (2002) Information and Computation , pp. 173
    • Hennessy, M.1    Riely, J.2
  • 30
    • 0001332424 scopus 로고    scopus 로고
    • Secure information flow as typed process behaviour
    • K. Honda, V. T. Vasconcelos, and N. Yoshida. Secure information flow as typed process behaviour. In ESOP '00, 2000.
    • (2000) ESOP '00
    • Honda, K.1    Vasconcelos, V.T.2    Yoshida, N.3
  • 40
    • 44049113210 scopus 로고
    • A calculus of mobile processes, I
    • R. Milner, J. Parrow, and D. Walker. A calculus of mobile processes, I. Inf. Comput., 100(1), 1992.
    • (1992) Inf. Comput. , vol.100 , Issue.1
    • Milner, R.1    Parrow, J.2    Walker, D.3
  • 41
    • 0005011263 scopus 로고
    • Polarized name passing
    • M. Odersky. Polarized name passing. In FST-TCS '95, 1995.
    • (1995) FST-TCS '95
    • Odersky, M.1
  • 43
    • 1942504253 scopus 로고    scopus 로고
    • Trust and partial typing in open systems of mobile agents
    • J. Riely and M. Hennessy. Trust and partial typing in open systems of mobile agents. J. Automated Reasoning, 31(3-4), 2003.
    • (2003) J. Automated Reasoning , vol.31 , Issue.3-4
    • Riely, J.1    Hennessy, M.2
  • 44
    • 29244472125 scopus 로고    scopus 로고
    • Property-based attestation for computing platforms: Caring about properties, not mechanisms
    • A.-R. Sadeghi and C. Stüble. Property-based attestation for computing platforms: Caring about properties, not mechanisms. In New Security Paradigms Workshop, 2004.
    • (2004) New Security Paradigms Workshop
    • Sadeghi, A.-R.1    Stüble, C.2
  • 46
    • 30144435491 scopus 로고    scopus 로고
    • Peer-to-peer access control architecture using trusted computing technology
    • R. Sandhu and X. Zhang. Peer-to-peer access control architecture using trusted computing technology. In SACMAT, 2005.
    • (2005) SACMAT
    • Sandhu, R.1    Zhang, X.2
  • 48
    • 0033293553 scopus 로고    scopus 로고
    • Building a high-performance, programmable secure coprocessor
    • Special Issue on Computer Network Security
    • S. Smith and S. Weingart. Building a high-performance, programmable secure coprocessor. Computer Networks, 31, 1999. Special Issue on Computer Network Security.
    • (1999) Computer Networks , pp. 31
    • Smith, S.1    Weingart, S.2
  • 49
    • 84976781807 scopus 로고
    • Reflections on trusting trust
    • K. Thompson. Reflections on trusting trust. CACM, 27(8), 1984.
    • (1984) CACM , vol.27 , Issue.8
    • Thompson, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.