메뉴 건너뛰기




Volumn 2, Issue , 2006, Pages 1855-1859

Trust[ed I in] computing, signed code and the heat death of the internet

(1)  Poritz, Jonathan A a  

a NONE   (Switzerland)

Author keywords

Binary attestation; OS virtualization; Property based attestation; Remote attestation; Security properties; Security property language; Signed code; Trust language; Web of trust

Indexed keywords

CODES (SYMBOLS); CRYPTOGRAPHY; NETWORK PROTOCOLS; REMOTE CONTROL; SECURITY OF DATA;

EID: 33751027456     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (9)

References (10)
  • 2
    • 85008038596 scopus 로고    scopus 로고
    • Improving the TCPA specification
    • B. Arbaugh, Improving the TCPA specification, IEEE Computer 35 (2002), no. 8, 77-79.
    • (2002) IEEE Computer , vol.35 , Issue.8 , pp. 77-79
    • Arbaugh, B.1
  • 3
    • 4544296687 scopus 로고    scopus 로고
    • The present and future of DRM -musings on emerging legal problems
    • Digital Rights Management (Eberhard Becker, Willms Buhse, Dirk Günnewig, and Niels Rump, eds.), Springer
    • S. Bechtold, The present and future of DRM -musings on emerging legal problems., Digital Rights Management (Eberhard Becker, Willms Buhse, Dirk Günnewig, and Niels Rump, eds.), Lecture Notes in Computer Science, vol. 2770, Springer, 2003, pp. 597-654.
    • (2003) Lecture Notes in Computer Science , vol.2770 , pp. 597-654
    • Bechtold, S.1
  • 5
    • 3042699012 scopus 로고    scopus 로고
    • Understanding trusted computing: Will its benefits outweigh its drawbacks?
    • Edward W. Felten, Understanding trusted computing: Will its benefits outweigh its drawbacks?, IEEE Security and Privacy 1 (2003), no. 3, 60-62.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.3 , pp. 60-62
    • Felten, E.W.1
  • 6
    • 33751033331 scopus 로고    scopus 로고
    • The future of trusted computing
    • R. Kay, The future of trusted computing, Commissioned Research Report, on TCG web site, 2005, https://www.trustedcomputinggroup.org/home/ IDC_Presentation.pdf.
    • (2005) Commissioned Research Report
    • Kay, R.1
  • 7
    • 33751040292 scopus 로고    scopus 로고
    • Hash chains: A weak link for trusted computing
    • submitted to
    • J. Poritz, Hash chains: a weak link for trusted computing, 2005, submitted to Eurocrypt'06.
    • (2005) Eurocrypt'06
    • Poritz, J.1
  • 8
    • 24644439462 scopus 로고    scopus 로고
    • Property attestation - Scalable and privacy-friendly assessment of peer computers
    • J. Poritz, M. Schunter, E. Van Herreweghen, and M. Waidner, Property attestation - scalable and privacy-friendly assessment of peer computers, IBM research report RZ3548, 2004.
    • (2004) IBM Research Report , vol.RZ3548
    • Poritz, J.1    Schunter, M.2    Van Herreweghen, E.3    Waidner, M.4
  • 9
    • 33749626363 scopus 로고    scopus 로고
    • a position paper of the Electronic Frontier Foundation
    • S. Schoen, Trusted computing: promise and risk, a position paper of the Electronic Frontier Foundation, 2003, http://www.eff.org/Infrastructure/trusted. computing/20031001_tc.php.
    • (2003) Trusted Computing: Promise and Risk
    • Schoen, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.