-
1
-
-
38049043782
-
-
TCG. Trusted Computing Group (2004) https://www.trustedcomputinggroup. org/downloads/background_docs/TCG_Backgrounder_November_2004.pdf
-
(2004)
Computing Group
-
-
Trusted, T.C.G.1
-
3
-
-
33646445517
-
-
Peinado, M., Chen, Y., England, P., et al.: NGSCB: A trusted open system. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, 3108, pp. 86-97. Springer, Heidelberg (2004)
-
Peinado, M., Chen, Y., England, P., et al.: NGSCB: A trusted open system. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 86-97. Springer, Heidelberg (2004)
-
-
-
-
6
-
-
0039927533
-
-
Lie, D., Thekkath, C., Mitchell, M., et al: Architectural support for copy and tamper resistant software. In: William, E., et al. (eds.) ASPLOS-IX 2000[C]. Operating Systems Review, 34, pp. 168-177. ACM Press, New York (2000)
-
Lie, D., Thekkath, C., Mitchell, M., et al: Architectural support for copy and tamper resistant software. In: William, E., et al. (eds.) ASPLOS-IX 2000[C]. Operating Systems Review, vol. 34, pp. 168-177. ACM Press, New York (2000)
-
-
-
-
7
-
-
21644455412
-
-
Garfinkel, T., Pfaff, B., Chow, J., et al.: Terra: A virtual machine-based platform for trusted computing. In: Birman, K., et al. (eds.) SOSP 2003 [C]. Operating Systems Review, 37, pp. 193-206. ACM Press, New York (2003)
-
Garfinkel, T., Pfaff, B., Chow, J., et al.: Terra: A virtual machine-based platform for trusted computing. In: Birman, K., et al. (eds.) SOSP 2003 [C]. Operating Systems Review, vol. 37, pp. 193-206. ACM Press, New York (2003)
-
-
-
-
8
-
-
33845936084
-
A Logical Account of NGSCB
-
de Frutos-Escrig, D, Núñez, M, eds, FORTE 2004, Springer, Heidelberg
-
Abadi, M., Wobber, T.: A Logical Account of NGSCB. In: de Frutos-Escrig, D., Núñez, M. (eds.) FORTE 2004. LNCS, vol. 3235, pp. 1-12. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3235
, pp. 1-12
-
-
Abadi, M.1
Wobber, T.2
-
9
-
-
24944532285
-
-
Patel, J., Teacy, W.T., Jennings, N.R., et al.: A Probabilistic Trust Model for Handling Inaccurate Reputation Sources. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, 3477, pp. 193-209. Springer, Heidelberg (2005)
-
Patel, J., Teacy, W.T., Jennings, N.R., et al.: A Probabilistic Trust Model for Handling Inaccurate Reputation Sources. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 193-209. Springer, Heidelberg (2005)
-
-
-
-
10
-
-
0002863367
-
Valuation of Trust in Open Network
-
Gollmann, D, ed, Computer Security, ESORICS, 875, pp, Springer, Heidelberg
-
Beth, T., Borcherding, M., Klein, B.: Valuation of Trust in Open Network. In: Gollmann, D. (ed.) Computer Security - ESORICS 94. LNCS, vol. 875, pp. 509-522. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.94
, pp. 509-522
-
-
Beth, T.1
Borcherding, M.2
Klein, B.3
-
11
-
-
8644242912
-
Dependability Modeling and Evaluation of Multiple Phased Systems Using DEEM
-
IEEE Press, New York
-
Bondavalli, A., Chiaradonna, S., Giandomenico, F.D., et al.: Dependability Modeling and Evaluation of Multiple Phased Systems Using DEEM. In: IEEE Transactions on Reliability, vol. 53, pp. 23-26. IEEE Press, New York (2000)
-
(2000)
IEEE Transactions on Reliability
, vol.53
, pp. 23-26
-
-
Bondavalli, A.1
Chiaradonna, S.2
Giandomenico, F.D.3
-
12
-
-
84947294004
-
Modelling a public-key infrastructure
-
Martella, G, Kurth, H, Montolivo, E, Bertino, E, eds, Computer Security, ESORICS, 1146, pp, Springer, Heidelberg
-
Maurer, U.: Modelling a public-key infrastructure. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) Computer Security - ESORICS 96. LNCS, vol. 1146, pp. 325-350. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.96
, pp. 325-350
-
-
Maurer, U.1
-
14
-
-
38049052133
-
-
TCG. TCPA Main Specification version 1.1b. (2006) https://www. trustedcomputinggroup.org/specs/TPM/TCPA_Main_TCG_Architecture_v1_ 1b.pdf
-
TCG. TCPA Main Specification version 1.1b. (2006) https://www. trustedcomputinggroup.org/specs/TPM/TCPA_Main_TCG_Architecture_v1_ 1b.pdf
-
-
-
|