메뉴 건너뛰기




Volumn 5222 LNCS, Issue , 2008, Pages 1-16

Property-based TPM virtualization

Author keywords

[No Author keywords available]

Indexed keywords

COST EFFECTIVENESS; MAINTAINABILITY; SECURITY OF DATA; SOLUTIONS;

EID: 56649102115     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85886-7_1     Document Type: Conference Paper
Times cited : (72)

References (26)
  • 1
    • 18444382358 scopus 로고    scopus 로고
    • The end of corporate computing
    • Carr, N.G.: The end of corporate computing. MIT Sloan Management Review 46(3), 67-73 (2005)
    • (2005) MIT Sloan Management Review , vol.46 , Issue.3 , pp. 67-73
    • Carr, N.G.1
  • 3
    • 56649085527 scopus 로고    scopus 로고
    • Trusted Computing Group: TPM Main Specification Version 1.1b (February 2002), https://www.trustedcomputinggroup.org
    • Trusted Computing Group: TPM Main Specification Version 1.1b (February 2002), https://www.trustedcomputinggroup.org
  • 4
    • 56649113222 scopus 로고    scopus 로고
    • Trusted Computing Group:, Version 1.2 rev, July 2007
    • Trusted Computing Group: TPM Main Specification Version 1.2 rev. 103 (July 2007), https://www.trustedcomputinggroup.org
    • Specification , pp. 103
    • Main, T.P.M.1
  • 5
    • 80053150585 scopus 로고    scopus 로고
    • July 2007
    • Microsoft Corporation: Bitlocker drive encryption (July 2007), http://www.microsoft.com/technet/windowsvista/security/bitlockr.mspx
    • Bitlocker drive encryption
  • 6
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • San Diego, California August
    • Sailer, R., Zhang, X., Jaeger, T., van Doom, L.: Design and implementation of a TCG-based integrity measurement architecture. In: 13th Usenix Security Symposium, San Diego, California (August 2004), pp. 223-238 (2004)
    • (2004) 13th Usenix Security Symposium , pp. 223-238
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    van Doom, L.4
  • 7
    • 84910156435 scopus 로고    scopus 로고
    • Berger, S., Caceres, R., Goldman, K.A., Perez, R., Sailer, R., van Doom, L.: vTPM: Virtualizing the Trusted Platform Module. In: Proceedings of the 15th USENIX Security Symposium, USENIX, August 2006, pp. 305-320 (2006)
    • Berger, S., Caceres, R., Goldman, K.A., Perez, R., Sailer, R., van Doom, L.: vTPM: Virtualizing the Trusted Platform Module. In: Proceedings of the 15th USENIX Security Symposium, USENIX, August 2006, pp. 305-320 (2006)
  • 8
    • 56649097759 scopus 로고    scopus 로고
    • Goldman, K., Berger, S.: TPM Main Part 3 - IBM Commands (April 2005), http: //www.research. ibm. com/secure_systems_department/projects/vtpm/ mainP3IBMCommandsrevl0.pdf
    • Goldman, K., Berger, S.: TPM Main Part 3 - IBM Commands (April 2005), http: //www.research. ibm. com/secure_systems_department/projects/vtpm/ mainP3IBMCommandsrevl0.pdf
  • 9
    • 51849091963 scopus 로고    scopus 로고
    • TPM virtualization: Building a general framework
    • Pohlmann, N, Reimer, H, eds, Vieweg, pp
    • Scarlata, V., Rozas, C., Wiseman, M., Grawrock, D., Vishik, C.: TPM virtualization: Building a general framework. In: Pohlmann, N., Reimer, H. (eds.) Trusted Computing, Vieweg, pp. 43-56 (2007)
    • (2007) Trusted Computing , pp. 43-56
    • Scarlata, V.1    Rozas, C.2    Wiseman, M.3    Grawrock, D.4    Vishik, C.5
  • 10
    • 0033293553 scopus 로고    scopus 로고
    • Building a high-performance, programmable secure coprocessor
    • Smith, S.W., Weingart, S.: Building a high-performance, programmable secure coprocessor. Computer Networks 31(8), 831-860 (1999)
    • (1999) Computer Networks , vol.31 , Issue.8 , pp. 831-860
    • Smith, S.W.1    Weingart, S.2
  • 11
    • 56649093227 scopus 로고    scopus 로고
    • Yee, B.S.: Using Secure Coprocessors. PhD thesis, School of Computer Science, Carnegie Mellon University (May 1994) CMU-CS-94-149
    • Yee, B.S.: Using Secure Coprocessors. PhD thesis, School of Computer Science, Carnegie Mellon University (May 1994) CMU-CS-94-149
  • 13
    • 21644481379 scopus 로고    scopus 로고
    • Bear: An open-source virtual secure coprocessor based on TCPA
    • Technical Report TR2003-471, Department of Computer Science, Dartmouth College
    • Macdonald, R., Smith, S., Marchesini, J., Wild, O.: Bear: An open-source virtual secure coprocessor based on TCPA. Technical Report TR2003-471, Department of Computer Science, Dartmouth College (2003)
    • (2003)
    • Macdonald, R.1    Smith, S.2    Marchesini, J.3    Wild, O.4
  • 17
    • 24644439462 scopus 로고    scopus 로고
    • Property attestation- scalable and privacy-friendly security assessment of peer computers
    • 3548, IBM Research May
    • Poritz, J., Schunter, M., Van Herreweghen, E., Waidner, M.: Property attestation- scalable and privacy-friendly security assessment of peer computers. Technical Report RZ 3548, IBM Research (May 2004)
    • (2004) Technical Report RZ
    • Poritz, J.1    Schunter, M.2    Van Herreweghen, E.3    Waidner, M.4
  • 18
    • 29244450159 scopus 로고    scopus 로고
    • Property-based attestation for computing platforms: Caring about properties, not mechanisms
    • ACM Press, New York
    • Sadeghi, A.R., Stüble, C.: Property-based attestation for computing platforms: Caring about properties, not mechanisms. In: The 2004 New Security Paradigms Workshop. ACM Press, New York (2004)
    • (2004) The 2004 New Security Paradigms Workshop
    • Sadeghi, A.R.1    Stüble, C.2
  • 22
    • 38149014725 scopus 로고    scopus 로고
    • Asokan, N., Ekberg, J.E., Sadeghi, A.R., Stüble, C., Wolf, M.: Enabling fairer digital rights management with trusted computing. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, 4779, pp. 53-70. Springer, Heidelberg (2007)
    • Asokan, N., Ekberg, J.E., Sadeghi, A.R., Stüble, C., Wolf, M.: Enabling fairer digital rights management with trusted computing. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 53-70. Springer, Heidelberg (2007)
  • 23
    • 21644433634 scopus 로고    scopus 로고
    • Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Pratt, I., Warfield, A., Barham, P., Neugebauer, R.: Xen and the art of virtualization. In: Proceedings of the ACM Symposium on Operating Systems Principles, October 2003, pp. 164-177 (2003)
    • Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Pratt, I., Warfield, A., Barham, P., Neugebauer, R.: Xen and the art of virtualization. In: Proceedings of the ACM Symposium on Operating Systems Principles, October 2003, pp. 164-177 (2003)
  • 24
    • 54249153664 scopus 로고    scopus 로고
    • Towards trustworthy virtualisation environments: Xen library os security service infrastructure
    • Technical Report HPL-2007-69, Hewlett-Packard Laboratories April
    • Anderson, M.J., Moffie, M., Dalton, C.I.: Towards trustworthy virtualisation environments: Xen library os security service infrastructure. Technical Report HPL-2007-69, Hewlett-Packard Laboratories (April 2007)
    • (2007)
    • Anderson, M.J.1    Moffie, M.2    Dalton, C.I.3
  • 26
    • 56649116306 scopus 로고    scopus 로고
    • Sailer, R., Valdez, E., Jaeger, T., Perez, R., van Doom, L., Griffin, J.L., Berger, S.: sHype: Secure hypervisor approach to trusted virtualized systems. Technical Report RC23511, IBM Research Division (February 2005)
    • Sailer, R., Valdez, E., Jaeger, T., Perez, R., van Doom, L., Griffin, J.L., Berger, S.: sHype: Secure hypervisor approach to trusted virtualized systems. Technical Report RC23511, IBM Research Division (February 2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.