메뉴 건너뛰기




Volumn 4991 LNCS, Issue , 2008, Pages 161-175

Securing peer-to-peer distributions for mobile devices

Author keywords

Peer to peer; Security architectures; Superdistribution; Trusted Computing; TrustZone

Indexed keywords

COMPUTER ARCHITECTURE; EMBEDDED SYSTEMS; MOBILE DEVICES; SECURITY SYSTEMS;

EID: 41549099706     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-79104-1_12     Document Type: Conference Paper
Times cited : (4)

References (20)
  • 1
    • 41549094150 scopus 로고    scopus 로고
    • ARM Ltd
    • ARM Ltd. AKM TrustZone. www.arm.com/products/esd/trustzone_home.html
    • AKM TrustZone
  • 2
    • 21644433634 scopus 로고    scopus 로고
    • Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho. A., Pratt, I., Warfield, A., Barham, P., Neugebauer, R.: Xen and the Art of Virtualization. In: SOSP 2003: Proceedings of the ACM Symposium on Operating Systems Principles (October 2003)
    • Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho. A., Pratt, I., Warfield, A., Barham, P., Neugebauer, R.: Xen and the Art of Virtualization. In: SOSP 2003: Proceedings of the ACM Symposium on Operating Systems Principles (October 2003)
  • 3
    • 41549100618 scopus 로고    scopus 로고
    • Ginzboorg, P., Ekberg, J.-E., Laitinen, P., Ylä-Jääski, A.: Charging for Broadband Access. In: ICTEC'98: Proceedings of the 1st International Conference on Telecommunications and Electronic Commerce (November 1998)
    • Ginzboorg, P., Ekberg, J.-E., Laitinen, P., Ylä-Jääski, A.: Charging for Broadband Access. In: ICTEC'98: Proceedings of the 1st International Conference on Telecommunications and Electronic Commerce (November 1998)
  • 6
    • 0030243542 scopus 로고    scopus 로고
    • Towards Real Microkernels
    • Liedtke, J.: Towards Real Microkernels. Communications of the ACM 39(9), 70-77 (1996)
    • (1996) Communications of the ACM , vol.39 , Issue.9 , pp. 70-77
    • Liedtke, J.1
  • 7
    • 0000675337 scopus 로고
    • Superdistribution: The Concept and the Architecture
    • Mori, K., Kawahara, M.: Superdistribution: The Concept and the Architecture. Transactions of the IEICE E 73(7), 1133-1146 (1990)
    • (1990) Transactions of the IEICE E , vol.73 , Issue.7 , pp. 1133-1146
    • Mori, K.1    Kawahara, M.2
  • 8
    • 33749054480 scopus 로고    scopus 로고
    • Nair, S.K., Popescu, B.C., Gamage, C. Crispo, B., Tanenbaum, A.S.: Enabling DKM-preserving Digital Content Redistribution. In: Proceedings of the 7th International IEEE Conference on E-Commerce Technology (July 2005)
    • Nair, S.K., Popescu, B.C., Gamage, C. Crispo, B., Tanenbaum, A.S.: Enabling DKM-preserving Digital Content Redistribution. In: Proceedings of the 7th International IEEE Conference on E-Commerce Technology (July 2005)
  • 9
    • 41549141374 scopus 로고    scopus 로고
    • Open Mobile Alliance. OMA DKM Version 2.0 March 2006
    • Open Mobile Alliance. OMA DKM Version 2.0 (March 2006). http://www.openmobilealliance.org
  • 10
    • 38149014725 scopus 로고    scopus 로고
    • Sadeghi, A.-K., Wolf, M., Stüble, C., Asokan, N., Ekberg. J.-E.: Enabling Fairer Digital Rights Management with Trusted Computing. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, K. (eds.) ISC 2007, LNCS. 4779, Springer, Heidelberg (2007)
    • Sadeghi, A.-K., Wolf, M., Stüble, C., Asokan, N., Ekberg. J.-E.: Enabling Fairer Digital Rights Management with Trusted Computing. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, K. (eds.) ISC 2007, LNCS. vol. 4779, Springer, Heidelberg (2007)
  • 11
    • 30144435491 scopus 로고    scopus 로고
    • Peer-to-Peer Access Control Architecture Using Trusted Computing Technology
    • Stockholm, Sweden June
    • Sandhu, K., Zhang, X.: Peer-to-Peer Access Control Architecture Using Trusted Computing Technology. In: SACMAT 2005, Stockholm, Sweden (June 2005)
    • (2005) SACMAT
    • Sandhu, K.1    Zhang, X.2
  • 13
    • 0003449566 scopus 로고    scopus 로고
    • Secure Coprocessing Applications and Research Issues
    • Los Alamos National Laboratory
    • Smith, S.W.: Secure Coprocessing Applications and Research Issues. Los Alamos Unclassified Release LA-UR-96-2805, Los Alamos National Laboratory (1996)
    • (1996) Los Alamos Unclassified Release LA-UR-96-2805
    • Smith, S.W.1
  • 16
    • 84870642654 scopus 로고    scopus 로고
    • TPM Main Specification
    • Trusted Computing Group, Technical Report Version 1.2 Revision 94
    • Trusted Computing Group. TPM Main Specification. Technical Report Version 1.2 Revision 94 (2006)
    • (2006)
  • 18
    • 41549161207 scopus 로고    scopus 로고
    • Tygar, J.D., Yee, B.S.: Strongbox: A System for Self-Securing Programs. In: CMU Computer Science: A 25th Anniversary Commemorative, pp. 163-197, Addison-Wesley, Reading (1991)
    • Tygar, J.D., Yee, B.S.: Strongbox: A System for Self-Securing Programs. In: CMU Computer Science: A 25th Anniversary Commemorative, pp. 163-197, Addison-Wesley, Reading (1991)
  • 19
    • 41549137001 scopus 로고    scopus 로고
    • Tygar, J.D., Yee, B.S.: Dyad: A System for Using Physically Secure Coprocessors. In: Proceedings of the IP Workshop (1994)
    • Tygar, J.D., Yee, B.S.: Dyad: A System for Using Physically Secure Coprocessors. In: Proceedings of the IP Workshop (1994)
  • 20
    • 0023171210 scopus 로고    scopus 로고
    • White, S.R., Comerford, L.D.: ABYSS: A Trusted Architecture for Software Protection. In: Proceedings of the IEEE Symposium on Security and Privacy (1987)
    • White, S.R., Comerford, L.D.: ABYSS: A Trusted Architecture for Software Protection. In: Proceedings of the IEEE Symposium on Security and Privacy (1987)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.