메뉴 건너뛰기




Volumn 4610 LNCS, Issue , 2007, Pages 352-360

Formal analysis of secure bootstrap in trusted computing

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER HARDWARE; MATHEMATICAL MODELS; PERSONAL COMPUTERS; SEMANTICS;

EID: 38049064378     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-73547-2_37     Document Type: Conference Paper
Times cited : (13)

References (14)
  • 1
    • 38049043782 scopus 로고    scopus 로고
    • TCG. Trusted Computing Group (2004) https://www.trustedcomputinggroup. org/downloads/background_docs/TCG_Backgrounder_November_2004.pdf
    • (2004) Computing Group
    • Trusted, T.C.G.1
  • 3
    • 33646445517 scopus 로고    scopus 로고
    • Peinado, M., Chen, Y., England, P., et al.: NGSCB: A trusted open system. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, 3108, pp. 86-97. Springer, Heidelberg (2004)
    • Peinado, M., Chen, Y., England, P., et al.: NGSCB: A trusted open system. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 86-97. Springer, Heidelberg (2004)
  • 6
    • 0039927533 scopus 로고    scopus 로고
    • Lie, D., Thekkath, C., Mitchell, M., et al: Architectural support for copy and tamper resistant software. In: William, E., et al. (eds.) ASPLOS-IX 2000[C]. Operating Systems Review, 34, pp. 168-177. ACM Press, New York (2000)
    • Lie, D., Thekkath, C., Mitchell, M., et al: Architectural support for copy and tamper resistant software. In: William, E., et al. (eds.) ASPLOS-IX 2000[C]. Operating Systems Review, vol. 34, pp. 168-177. ACM Press, New York (2000)
  • 7
    • 21644455412 scopus 로고    scopus 로고
    • Garfinkel, T., Pfaff, B., Chow, J., et al.: Terra: A virtual machine-based platform for trusted computing. In: Birman, K., et al. (eds.) SOSP 2003 [C]. Operating Systems Review, 37, pp. 193-206. ACM Press, New York (2003)
    • Garfinkel, T., Pfaff, B., Chow, J., et al.: Terra: A virtual machine-based platform for trusted computing. In: Birman, K., et al. (eds.) SOSP 2003 [C]. Operating Systems Review, vol. 37, pp. 193-206. ACM Press, New York (2003)
  • 8
    • 33845936084 scopus 로고    scopus 로고
    • A Logical Account of NGSCB
    • de Frutos-Escrig, D, Núñez, M, eds, FORTE 2004, Springer, Heidelberg
    • Abadi, M., Wobber, T.: A Logical Account of NGSCB. In: de Frutos-Escrig, D., Núñez, M. (eds.) FORTE 2004. LNCS, vol. 3235, pp. 1-12. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3235 , pp. 1-12
    • Abadi, M.1    Wobber, T.2
  • 9
    • 24944532285 scopus 로고    scopus 로고
    • Patel, J., Teacy, W.T., Jennings, N.R., et al.: A Probabilistic Trust Model for Handling Inaccurate Reputation Sources. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, 3477, pp. 193-209. Springer, Heidelberg (2005)
    • Patel, J., Teacy, W.T., Jennings, N.R., et al.: A Probabilistic Trust Model for Handling Inaccurate Reputation Sources. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 193-209. Springer, Heidelberg (2005)
  • 10
    • 0002863367 scopus 로고
    • Valuation of Trust in Open Network
    • Gollmann, D, ed, Computer Security, ESORICS, 875, pp, Springer, Heidelberg
    • Beth, T., Borcherding, M., Klein, B.: Valuation of Trust in Open Network. In: Gollmann, D. (ed.) Computer Security - ESORICS 94. LNCS, vol. 875, pp. 509-522. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.94 , pp. 509-522
    • Beth, T.1    Borcherding, M.2    Klein, B.3
  • 11
    • 8644242912 scopus 로고    scopus 로고
    • Dependability Modeling and Evaluation of Multiple Phased Systems Using DEEM
    • IEEE Press, New York
    • Bondavalli, A., Chiaradonna, S., Giandomenico, F.D., et al.: Dependability Modeling and Evaluation of Multiple Phased Systems Using DEEM. In: IEEE Transactions on Reliability, vol. 53, pp. 23-26. IEEE Press, New York (2000)
    • (2000) IEEE Transactions on Reliability , vol.53 , pp. 23-26
    • Bondavalli, A.1    Chiaradonna, S.2    Giandomenico, F.D.3
  • 12
    • 84947294004 scopus 로고    scopus 로고
    • Modelling a public-key infrastructure
    • Martella, G, Kurth, H, Montolivo, E, Bertino, E, eds, Computer Security, ESORICS, 1146, pp, Springer, Heidelberg
    • Maurer, U.: Modelling a public-key infrastructure. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) Computer Security - ESORICS 96. LNCS, vol. 1146, pp. 325-350. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.96 , pp. 325-350
    • Maurer, U.1
  • 14
    • 38049052133 scopus 로고    scopus 로고
    • TCG. TCPA Main Specification version 1.1b. (2006) https://www. trustedcomputinggroup.org/specs/TPM/TCPA_Main_TCG_Architecture_v1_ 1b.pdf
    • TCG. TCPA Main Specification version 1.1b. (2006) https://www. trustedcomputinggroup.org/specs/TPM/TCPA_Main_TCG_Architecture_v1_ 1b.pdf


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.