메뉴 건너뛰기




Volumn 2006-May, Issue , 2006, Pages 51-57

Trust and tamper-proof software delivery

Author keywords

Digital signature; Integrity; Security; Software development

Indexed keywords

AUTHENTICATION; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; SOFTWARE ENGINEERING; SUPPLY CHAINS;

EID: 39749173464     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1137627.1137636     Document Type: Conference Paper
Times cited : (5)

References (28)
  • 1
    • 84953454682 scopus 로고    scopus 로고
    • Alliance for Telecommunications Industry Solutions (ATIS) Committee T1A1. ATIS Telecom Glossary
    • Alliance for Telecommunications Industry Solutions (ATIS) Committee T1A1. ATIS Telecom Glossary 2000. http://www.atis.org/tg2k/.
    • (2000)
  • 3
    • 84982899264 scopus 로고    scopus 로고
    • Secure internet programming: Issues in distributed and mobile object systems, chapter the role of trust management in distributed systems security
    • Springer-Verlag
    • M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis. Secure Internet Programming: Issues in Distributed and Mobile Object Systems, chapter The Role of Trust Management in Distributed Systems Security, pages 185-210. Lecture Notes in Computer Science State-of-the-Art series. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science State-of-the-Art Series , pp. 185-210
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.D.4
  • 5
    • 84952955166 scopus 로고    scopus 로고
    • Technical Report SUNYIT 2004-1, SUNY Institute of Technology Department of Computer Science
    • M. de Mare and L. DeCoursey. A survey of the timestamping problem. Technical Report SUNYIT 2004-1, SUNY Institute of Technology Department of Computer Science, 2004.
    • (2004) A Survey of the Timestamping Problem
    • De Mare, M.1    DeCoursey, L.2
  • 12
    • 84953454684 scopus 로고    scopus 로고
    • IEC. Functional safety of electrical /electronic /programmable electronic safety-related systems, part 1-7. Standard IEC 61508, December 1998
    • IEC. Functional safety of electrical /electronic /programmable electronic safety-related systems, part 1-7. Standard IEC 61508, December 1998.
  • 13
    • 84953454685 scopus 로고    scopus 로고
    • ISO/IEC. Evaluation Criteria for Information Technology Security, version 2.1. Standard ISO/IEC 15408, December 1999
    • ISO/IEC. Evaluation Criteria for Information Technology Security, version 2.1. Standard ISO/IEC 15408, December 1999.
  • 15
  • 16
    • 3042825670 scopus 로고    scopus 로고
    • Poisoning the software supply chain
    • May-June
    • E. Levy. Poisoning the software supply chain. EEE Security and Privacy, 1(3):70-73, May-June 2003.
    • (2003) EEE Security and Privacy , vol.1 , Issue.3 , pp. 70-73
    • Levy, E.1
  • 19
    • 21244466307 scopus 로고    scopus 로고
    • New approaches to digital evidence
    • June
    • U. Maurer. New approaches to digital evidence. Proceedings of the IEEE, 92(6):933-947, June 2004.
    • (2004) Proceedings of the IEEE , vol.92 , Issue.6 , pp. 933-947
    • Maurer, U.1
  • 23
    • 0037330636 scopus 로고    scopus 로고
    • Understanding the Windows EAL4 evaluation
    • J. S. Shapiro. Understanding the Windows EAL4 evaluation. EEE Computer, 36(2):102-105, 2003.
    • (2003) EEE Computer , vol.36 , Issue.2 , pp. 102-105
    • Shapiro, J.S.1
  • 25
  • 26
    • 84976781807 scopus 로고
    • Reflections on trusting trust
    • August
    • K. Thompson. Reflections on trusting trust. Communication of the ACM, 27(8):761-763, August 1984.
    • (1984) Communication of the ACM , vol.27 , Issue.8 , pp. 761-763
    • Thompson, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.