메뉴 건너뛰기




Volumn 2908, Issue , 2004, Pages 286-302

Taming "trusted platforms" by operating system design

Author keywords

[No Author keywords available]

Indexed keywords

CELLULAR TELEPHONE SYSTEMS; COMPUTER OPERATING SYSTEMS; COPYRIGHTS; EMBEDDED SYSTEMS; HARDWARE; LINUX; SECURITY OF DATA; SYSTEMS ANALYSIS; TRUSTED COMPUTING;

EID: 35048881059     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24591-9_22     Document Type: Article
Times cited : (18)

References (41)
  • 3
    • 0347772582 scopus 로고    scopus 로고
    • Security in open versus closed systems - The dance of Boltzmann, Coase and Moore
    • Cambridge University, England
    • R. J. Anderson. Security in open versus closed systems - the dance of Boltzmann, Coase and Moore. Technical report, Cambridge University, England, 2002.
    • (2002) Technical Report
    • Anderson, R.J.1
  • 7
    • 85008038596 scopus 로고    scopus 로고
    • Improving the TCPA specification
    • Aug.
    • W. A. Arbaugh. Improving the TCPA specification. IEEE Computer, pages 77-79, Aug. 2002.
    • (2002) IEEE Computer , pp. 77-79
    • Arbaugh, W.A.1
  • 8
    • 0030672130 scopus 로고    scopus 로고
    • A reliable bootstrap architecture
    • Oakland, CA, May IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press
    • W. A. Arbaugh, D. J. Farber, and J. M. Smith. A reliable bootstrap architecture. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 65-71, Oakland, CA, May 1997. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press.
    • (1997) Proceedings of the IEEE Symposium on Research in Security and Privacy , pp. 65-71
    • Arbaugh, W.A.1    Farber, D.J.2    Smith, J.M.3
  • 10
    • 18844373581 scopus 로고    scopus 로고
    • Microsoft "Palladium":A business overview
    • Microsoft Content Security Business Unit, August
    • A. Carroll, M. Juarez, J. Polk, and T. Leininger. Microsoft "Palladium":A business overview. Technical report, Microsoft Content Security Business Unit, August 2002.
    • (2002) Technical Report
    • Carroll, A.1    Juarez, M.2    Polk, J.3    Leininger, T.4
  • 11
    • 35048898710 scopus 로고    scopus 로고
    • Microsoft "Palladium":A business overview - Combining microsoft windows features, personal computing hardware, and software applications for greater security, personal privacy and system integrity
    • Microsoft Windows Trusted Platform Technologies, July
    • A. Carroll, M. Juarez, J. Polk, and T. Leininger. Microsoft "Palladium":A business overview - combining microsoft windows features, personal computing hardware, and software applications for greater security, personal privacy and system integrity. White paper, Microsoft Windows Trusted Platform Technologies, July 2002.
    • (2002) White Paper
    • Carroll, A.1    Juarez, M.2    Polk, J.3    Leininger, T.4
  • 12
    • 35048865275 scopus 로고    scopus 로고
    • Common Criteria Project Sponsoring Organisations
    • Aug. Version 2.1, adopted by ISO/IEC as ISO/IEC International Standard (IS) 15408 1-3.
    • Common Criteria Project Sponsoring Organisations. Common Criteria for Information Technology Security Evaluation, Aug. 1999. Version 2.1, adopted by ISO/IEC as ISO/IEC International Standard (IS) 15408 1-3. Available from http://csrc.ncsl.nist.gov/cc/ccv20/ccv21ist.htm.
    • (1999) Common Criteria for Information Technology Security Evaluation
  • 13
    • 35048852999 scopus 로고    scopus 로고
    • Building a secure platform for trustworthy computing
    • Microsoft Corporation, Dec.
    • M. Corporation. Building a secure platform for trustworthy computing. White paper, Microsoft Corporation, Dec. 2002.
    • (2002) White Paper
    • Corporation, M.1
  • 16
    • 0020778471 scopus 로고
    • SCOMP:A solution to the multilevel security problem
    • July
    • L. Fraim. SCOMP:A solution to the multilevel security problem. In IEEE Computer, pages 26-34, July 1983.
    • (1983) IEEE Computer , pp. 26-34
    • Fraim, L.1
  • 19
    • 85084160278 scopus 로고    scopus 로고
    • Software generation of practically strong random numbers
    • San Antonio, Texas, USA, Jan. USENIX
    • P. Gutmann. Software generation of practically strong random numbers. In Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas, USA, Jan. 1998. USENIX.
    • (1998) Proceedings of the 7th USENIX Security Symposium
    • Gutmann, P.1
  • 23
    • 21644444664 scopus 로고    scopus 로고
    • Towards untrusted device drivers
    • School of Computer Science and Engineering, Mar.
    • B. Leslie and G. Heiser. Towards untrusted device drivers. Technical Report UNSW-CSE-TR-0303, School of Computer Science and Engineering, Mar. 2003.
    • (2003) Technical Report UNSW-CSE-TR-0303
    • Leslie, B.1    Heiser, G.2
  • 24
    • 35048879633 scopus 로고
    • Clans and Chiefs, a new kernel level concept for operating systems
    • GMD
    • J. Liedke. Clans and Chiefs, a new kernel level concept for operating systems. Working paper, GMD, 1991.
    • (1991) Working Paper
    • Liedke, J.1
  • 25
  • 26
    • 1542488743 scopus 로고    scopus 로고
    • Integrating flexible support for security policies into the Linux operating system
    • U.S. National Security Agency (NSA), Feb.
    • P. Loscocco and S. Smalley. Integrating flexible support for security policies into the Linux operating system. Technical report, U.S. National Security Agency (NSA), Feb. 2001.
    • (2001) Technical Report
    • Loscocco, P.1    Smalley, S.2
  • 27
    • 27244449284 scopus 로고    scopus 로고
    • Microsoft whitepaper on trustworthy computing
    • Microsoft Corporation, Oct.
    • C. Mundie, P. de Vries, P. Haynes, and M. Corwine. Microsoft whitepaper on trustworthy computing. Technical report, Microsoft Corporation, Oct. 2002.
    • (2002) Technical Report
    • Mundie, C.1    De Vries, P.2    Haynes, P.3    Corwine, M.4
  • 30
    • 23444443537 scopus 로고    scopus 로고
    • Clarifying misinformation on TCPA
    • IBM Research, Oct.
    • D. Safford. Clarifying misinformation on TCPA. White paper, IBM Research, Oct. 2002.
    • (2002) White Paper
    • Safford, D.1
  • 31
    • 23444455154 scopus 로고    scopus 로고
    • The need for TCPA
    • IBM Research, Oct.
    • D. Safford. The need for TCPA. White paper, IBM Research, Oct. 2002.
    • (2002) White Paper
    • Safford, D.1
  • 35
    • 35048884557 scopus 로고    scopus 로고
    • TCPA PC specific implementation specification, Sept. Version 1.00
    • Trusted Computing Platform Alliance (TCPA). TCPA PC specific implementation specification, Sept. 2001. Version 1.00.
    • (2001) Trusted Computing Platform Alliance (TCPA)
  • 41
    • 0003887737 scopus 로고    scopus 로고
    • prz@acm.org, 1994. The MIT Press In press. More in
    • P. Zimmerman. The Official PGP User's Guide, prz@acm.org, 1994. The MIT Press In press. More in http://www.pegasus.esprit.ec.org/people/arne/pgp.html.
    • The Official PGP User's Guide
    • Zimmerman, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.