-
1
-
-
34548150241
-
How to implement trusted computing, a guide to tighter enterprise security
-
Roger L Kay. How to Implement Trusted Computing, A Guide to Tighter Enterprise Security [OL]. https://www.trustedcom-putinggroup.org/
-
-
-
Kay, R.L.1
-
2
-
-
78149350129
-
Next-generation secure Application base
-
Microsoft
-
Microsoft. Next-generation secure Application base [OL]. http://www.microsoft.com/resources/ngscb.
-
-
-
-
3
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
Lake Tahoe, California, USA: ACM Press
-
R Sailer, X Zhang, T Jaeger, L van Doom. Design and implementation of a TCG-based integrity measurement architecture [A]. In Proceedings of USENTX Security Symposium [C]. Lake Tahoe, California, USA: ACM Press, Aug. 2004. 223-238.
-
(2004)
Proceedings of USENTX Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
van Doom, L.4
-
4
-
-
3042738543
-
SWAtt: Soft-Ware-based Attestation for embedded devices
-
Oakland, CA, USA: IEEE Press
-
A Seshadri, A Perrig, L van Doom, P Khosla. SWAtt: Soft-Ware-based Attestation for embedded devices [A]. In Proceedings of IEEE Symposium on Security and Privacy [C]. Oakland, CA, USA: IEEE Press, May 2004.272-282
-
(2004)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
van Doom, L.3
Khosla, P.4
-
5
-
-
70349659108
-
Semantic remote attestation - A virtual machine directed approach to trusted computing
-
San Jose, CA, US A: USENK
-
V Haldar, D Chandra, M Franz. Semantic remote attestation-a virtual machine directed approach to trusted computing [A]. In Proc. of the Third virtual Machine Research and Technology Symposium [C]. San Jose, CA, US A: USENK, 2004.29-41.
-
(2004)
Proc. of the Third virtual Machine Research and Technology Symposium
, pp. 29-41
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
6
-
-
27544477855
-
Bind: A fine-grained attestation service for secure distributed systems
-
Oakland, CA, USA: IEEE Press
-
E Shi, A Perrig, L van Doom. Bind: A fine-grained attestation service for secure distributed systems [A]. In Proc of the IEEE Symposium on Security and Privacy [C]. Oakland, CA, USA: IEEE Press, 2005.154-168.
-
(2005)
Proc of the IEEE Symposium on Security and Privacy
, pp. 154-168
-
-
Shi, E.1
Perrig, A.2
van Doom, L.3
-
7
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
Nova Scotia, Canada: ACM Press
-
Ahmad-Reza Sadeghi, Christian Stable. Property-based Attestation for Computing Platforms: Caring about properties, not mechanisms [A]. In Proceedings of the 2004 Workshop on New Security Paradigms [C]. Nova Scotia, Canada: ACM Press, 2004.66-77.
-
(2004)
Proceedings of the 2004 Workshop on New Security Paradigms
, pp. 66-77
-
-
Sadeghi, A.-R.1
Stable, C.2
-
8
-
-
24644439462
-
Property attestation-scalable and privacy-friendly security assessment of peer computers, IBM Research Report RZ 3548, 2004
-
J Poritz, M Schunter, E V Herreweghen, M Waidner. Property attestation-scalable and privacy-friendly security assessment of peer computers, IBM Research Report RZ 3548, 2004 [OL]. http://domino.watson.ibm.com/library/cyberdig.nsf/papers/
-
-
-
Poritz, J.1
Schunter, M.2
Herreweghen, E.V.3
Waidner, M.4
-
9
-
-
77952351793
-
TCG specification architecture overview, version1.2
-
TCG
-
TCG. TCG Specification Architecture Overview, Version1.2 [S]. https://www.trustedApplicationgroup.org.
-
-
-
-
11
-
-
34548189530
-
-
Chinese source
-
-
-
-
12
-
-
21644454794
-
Open-source applications of TCPA hardware
-
Hanover, NH, USA: IEEE Press
-
J Marchesini, S W Smith, O Wild, J Stabiner, A Barsamian. Open-source applications of TCPA hardware [A]. In Applied Computer Security Applications Conference. Hanover [C]. NH, USA: IEEE Press 2004.294-303.
-
(2004)
Applied Computer Security Applications Conference
, pp. 294-303
-
-
Marchesini, J.1
Smith, S.W.2
Wild, O.3
Stabiner, J.4
Barsamian, A.5
-
13
-
-
34548162425
-
-
Chinese source
-
-
-
-
14
-
-
34548172518
-
-
Chinese source
-
-
-
-
15
-
-
0038043216
-
Security performance
-
Daniel A. Menasce. Security performance [J]. IEEE Internet Computing, 2003, 7(3): 84-87.
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.3
, pp. 84-87
-
-
Menasce, D.A.1
|