-
1
-
-
13244299564
-
Extensible Authentication Protocol (EAP)
-
June
-
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: Extensible Authentication Protocol (EAP). RPC 3748 (Proposed Standard) (June 2004)
-
(2004)
RPC 3748 (Proposed Standard)
-
-
Aboba, B.1
Blunk, L.2
Vollbrecht, J.3
Carlson, J.4
Levkowetz, H.5
-
2
-
-
1142270162
-
-
Balacheff, B, Chen, L, Pearson, S, Plaquin, D, Proudler, G, eds, Prentice Hall PTR, Upper Saddle River
-
Balacheff, B., Chen, L., Pearson, S., Plaquin, D., Proudler, G. (eds.): Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall PTR, Upper Saddle River (2003)
-
(2003)
Trusted Computing Platforms: TCPA Technology in Context
-
-
-
3
-
-
34547196300
-
A protocol for property-based attestation
-
ACM Press, New York
-
Chen, L., Landfermann, R., Löhr, H., Rohe, M., Sadeghi, A.-R., Stüble, C.: A protocol for property-based attestation. In: STC 2006: Proceedings, First ACM Workshop on Scalable Trusted Computing, pp. 7-16. ACM Press, New York (2006)
-
(2006)
STC 2006: Proceedings, First ACM Workshop on Scalable Trusted Computing
, pp. 7-16
-
-
Chen, L.1
Landfermann, R.2
Löhr, H.3
Rohe, M.4
Sadeghi, A.-R.5
Stüble, C.6
-
5
-
-
42549137149
-
-
November 2006
-
Intel Corporation. Intel trusted execution technology (November 2006), http://download.intel.com/technology/security/downloads/31516803.pdf
-
Intel trusted execution technology
-
-
-
6
-
-
57049084682
-
-
Microsoft Corporation. Ngscb official page (2007). http://www.microsoft. com/resources/ngscb/default.mspx
-
(2007)
Ngscb official page
-
-
-
8
-
-
57049105840
-
-
TCG Best Practices Group. Design, Implementation, and Usage Principles for TPM-Based Platforms. Version 1.0 May 2005
-
TCG Best Practices Group. Design, Implementation, and Usage Principles for TPM-Based Platforms. Version 1.0 (May 2005)
-
-
-
-
9
-
-
3042563843
-
Authentication tests and disjoint encryption: A design method for security protocols
-
Guttman, I.D.: Authentication tests and disjoint encryption: a design method for security protocols. Journal of Computer Security 12(3/4), 409-433 (2004)
-
(2004)
Journal of Computer Security
, vol.12
, Issue.3-4
, pp. 409-433
-
-
Guttman, I.D.1
-
10
-
-
33646176467
-
-
Guttman, J.D., Herzog, J.C., Ramsdell. J.D., Sniffen, B.T.: Programming cryptographic protocols. In: De Nicola. R., Sangiorgi, D. (eds.) TGC 2005. LNCS. 3705, pp. 116-145. Springer, Heidelberg (2005)
-
Guttman, J.D., Herzog, J.C., Ramsdell. J.D., Sniffen, B.T.: Programming cryptographic protocols. In: De Nicola. R., Sangiorgi, D. (eds.) TGC 2005. LNCS. vol. 3705, pp. 116-145. Springer, Heidelberg (2005)
-
-
-
-
11
-
-
35048867881
-
-
Guttman, J.D., Thayer, F.J., Carlson, J.A., Herzog, J.C., Ramsdell, J.D., Sniffen, B.T.: Trust management in strand spaces: A rely-guarantee method. In: Schmidt, D. (ed.) ESOP 2004. LNCS, 2986, pp. 325-339. Springer, Heidelberg (2004)
-
Guttman, J.D., Thayer, F.J., Carlson, J.A., Herzog, J.C., Ramsdell, J.D., Sniffen, B.T.: Trust management in strand spaces: A rely-guarantee method. In: Schmidt, D. (ed.) ESOP 2004. LNCS, vol. 2986, pp. 325-339. Springer, Heidelberg (2004)
-
-
-
-
12
-
-
70349659108
-
Semantic remote attestation - a virtual machine directed approach to trusted computing
-
May, USENIX
-
Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation - a virtual machine directed approach to trusted computing. In: Proceedings of the Third virtual Machine Research and Technology Symposium. May 2004, pp. 29-41. USENIX (2004)
-
(2004)
Proceedings of the Third virtual Machine Research and Technology Symposium
, pp. 29-41
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
13
-
-
85084162914
-
Copilot - a coprocessorbased kernel runtime integrity monitor
-
USENIX
-
Petroni Jr., N.L., Fraser, T., Molina, J., Arbaugh, W.A.: Copilot - a coprocessorbased kernel runtime integrity monitor. In: USENIX Security Symposium, pp. 179-194. USENIX (2004)
-
(2004)
USENIX Security Symposium
, pp. 179-194
-
-
Petroni Jr., N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
14
-
-
34547148412
-
Layering negotiations for flexible attestation
-
ACM Press, New York
-
Katsuno, Y., Watanabe, Y., Yoshihama, S., Mishina, T., Kudoh, M.: Layering negotiations for flexible attestation. In: STC 2006: Proceedings, First ACM Workshop on Scalable Trusted Computing, pp. 17-20. ACM Press, New York (2006)
-
(2006)
STC 2006: Proceedings, First ACM Workshop on Scalable Trusted Computing
, pp. 17-20
-
-
Katsuno, Y.1
Watanabe, Y.2
Yoshihama, S.3
Mishina, T.4
Kudoh, M.5
-
15
-
-
78751681870
-
Advanced tactic targeted grocer: 'Malware stole Hannaford data
-
18 March
-
Kerber, R.: Advanced tactic targeted grocer: 'Malware" stole Hannaford data. The Boston Globe p. 1, 18 March (2008)
-
(2008)
The Boston Globe
, pp. 1
-
-
Kerber, R.1
-
16
-
-
57049099887
-
-
LOBCOCCO, P., Smalley, S.: Integrating flexible support for security policies into the linux operating system. Technical report, NSA, NAl Labs (April 2001)
-
LOBCOCCO, P., Smalley, S.: Integrating flexible support for security policies into the linux operating system. Technical report, NSA, NAl Labs (April 2001)
-
-
-
-
17
-
-
57049173146
-
-
Milien, J., Guttman, J., Ramsdell, J., Sheehy, J., Sniffen, B.: Call by contract for cryptographic protocol. In: FCS-ARSPA (2006)
-
Milien, J., Guttman, J., Ramsdell, J., Sheehy, J., Sniffen, B.: Call by contract for cryptographic protocol. In: FCS-ARSPA (2006)
-
-
-
-
18
-
-
33751027456
-
Trust[ed -in] computing, signed code and the heat death of the internet
-
ACM Press, New York
-
Poritz, J.A.: Trust[ed -in] computing, signed code and the heat death of the internet. In: SAC 2006: Proceedings of the 2006 ACM symposium on Applied computing, pp. 1855-1859. ACM Press, New York (2006)
-
(2006)
SAC 2006: Proceedings of the 2006 ACM symposium on Applied computing
, pp. 1855-1859
-
-
Poritz, J.A.1
-
19
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
ACM Press. New York
-
Sadeghi, A.-R., Stüble, C.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: NSPW 2004: Proceedings, 2004 Workshop on New Security Paradigms, pp. 67-77. ACM Press. New York (2004)
-
(2004)
NSPW 2004: Proceedings, 2004 Workshop on New Security Paradigms
, pp. 67-77
-
-
Sadeghi, A.-R.1
Stüble, C.2
-
21
-
-
84885617227
-
Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
-
October
-
Seshadri, A., Luk, M., Shi, E., Perrig, A., van Doom, L., Khosla, P.: Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms. In: Proceedings of ACM Symposium on Operating Systems Principles (SOSP). October 2005, pp. 1-16 (2005)
-
(2005)
Proceedings of ACM Symposium on Operating Systems Principles (SOSP)
, pp. 1-16
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
van Doom, L.5
Khosla, P.6
-
22
-
-
27544477855
-
-
Shi, E., Perrig, A., Van Doom, L.: BIND: A time-of-use attestation service for secure distributed systems. In: Proceedings of IEEE Symposium on Security and Privacy (May 2005)
-
Shi, E., Perrig, A., Van Doom, L.: BIND: A time-of-use attestation service for secure distributed systems. In: Proceedings of IEEE Symposium on Security and Privacy (May 2005)
-
-
-
-
23
-
-
84885633990
-
Nexus: A new operating system for trustworthy computing
-
ACM Press, New York
-
Shieh, A., Williams, D., Sirer, E.G., Schneider, F.B.: Nexus: a new operating system for trustworthy computing. In: SOSP 2005: Proceedings of the twentieth ACM symposium on Operating systems principles, pp. 1-9. ACM Press, New York (2005)
-
(2005)
SOSP 2005: Proceedings of the twentieth ACM symposium on Operating systems principles
, pp. 1-9
-
-
Shieh, A.1
Williams, D.2
Sirer, E.G.3
Schneider, F.B.4
-
24
-
-
57049143785
-
-
Stone, B.: 11 charged in theft of 41 million card numbers. The New York Times, p. B 1, 5 August (2008)
-
Stone, B.: 11 charged in theft of 41 million card numbers. The New York Times, p. B 1, 5 August (2008)
-
-
-
-
25
-
-
57049182549
-
-
Trusted Computing Group, version 1.1b edition
-
Trusted Computing Group. TPM Main Specification, version 1.1b edition (2001), https://www.trustedcomputinggroup.org/downloads/tcg-spec-1-1b.zip
-
(2001)
TPM Main Specification
-
-
-
26
-
-
57049084115
-
-
Trusted Computing Group. TCG Trusted Network Connect: TNC Architecture for Interoperability. Version 1.1 May 2006
-
Trusted Computing Group. TCG Trusted Network Connect: TNC Architecture for Interoperability. Version 1.1 (May 2006)
-
-
-
-
27
-
-
57049088649
-
-
Trusted Computing Group. TCG Trusted Network Connect TNC IF-IMC, Version 1.1 May 2006
-
Trusted Computing Group. TCG Trusted Network Connect TNC IF-IMC, Version 1.1 (May 2006)
-
-
-
|