메뉴 건너뛰기




Volumn 4968 LNCS, Issue , 2008, Pages 1-13

Practical techniques for operating system attestation

Author keywords

Attestation; Security distributed systems; Security models; Trusted computing

Indexed keywords

ATTESTATION; AUTHENTICATION SCHEMES; EXECUTION STATES; HYPERVISOR; OPERATING SYSTEMS; PRACTICAL TECHNIQUES; SECURITY DISTRIBUTED SYSTEMS; SECURITY MODELS; TRADE OFFS; TRUSTED COMPUTING;

EID: 54249143197     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-68979-9_1     Document Type: Conference Paper
Times cited : (15)

References (20)
  • 1
    • 54249136666 scopus 로고    scopus 로고
    • Specifications are available on the TCG web site
    • Specifications are available on the TCG web site, http ://www.trustedcomputinggroup.org
  • 2
    • 54249142532 scopus 로고    scopus 로고
    • Microft Online Crash Analysis data
    • Microft Online Crash Analysis data
  • 6
    • 84947424562 scopus 로고    scopus 로고
    • England, P., Peinado, M.: Authenticated operation of open computing devices. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002, LNCS, 2384, pp. 346-361, Springer, Heidelberg (2002)
    • England, P., Peinado, M.: Authenticated operation of open computing devices. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002, LNCS, vol. 2384, pp. 346-361, Springer, Heidelberg (2002)
  • 7
    • 33646056390 scopus 로고    scopus 로고
    • Franklin, M., Mitcham, K., Smith, S.W., Stabiner, J., Wild, O.: Ca-in-a-box. In: EuroPKI: Lecture notes in computer science, pp. 180-190 (2005)
    • Franklin, M., Mitcham, K., Smith, S.W., Stabiner, J., Wild, O.: Ca-in-a-box. In: EuroPKI: Lecture notes in computer science, pp. 180-190 (2005)
  • 15
    • 84976834054 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: theory and practice, ACM Trans. Comput. Syst. 10(4), 265-310 (1992)
    • (1992) ACM Trans. Comput. Syst , vol.10 , Issue.4 , pp. 265-310
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 16
    • 54249143446 scopus 로고    scopus 로고
    • Para-virtualized tpm sharing
    • these proceedings, London, UK, Springer, Heidelberg
    • Loeser, J., England, P.: Para-virtualized tpm sharing. In: Proceedings of TRUST2008 (these proceedings), London, UK, Springer, Heidelberg (2008)
    • (2008) Proceedings of TRUST2008
    • Loeser, J.1    England, P.2
  • 17
    • 84958802026 scopus 로고
    • A digital signature based on a conventional encryption function
    • Pomerance, C, ed, CRYPTO 1987, Springer, Heidelberg
    • Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369-378, Springer, Heidelberg (1988)
    • (1988) LNCS , vol.293 , pp. 369-378
    • Merkle, R.C.1
  • 19
    • 1142270162 scopus 로고    scopus 로고
    • Trusted Computing Platforms: TCPA Technology in Context
    • Prentice Hall, Englewood Cliffs
    • Pearson, S.: Trusted Computing Platforms: TCPA Technology in Context (HP Professional Series), Prentice Hall, Englewood Cliffs (2002)
    • (2002) HP Professional Series
    • Pearson, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.