메뉴 건너뛰기




Volumn 5308 LNCS, Issue , 2008, Pages 1-18

Attestation: Evidence and trust

Author keywords

[No Author keywords available]

Indexed keywords

SEMANTICS;

EID: 57049135781     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-88625-9_1     Document Type: Conference Paper
Times cited : (36)

References (27)
  • 2
    • 1142270162 scopus 로고    scopus 로고
    • Balacheff, B, Chen, L, Pearson, S, Plaquin, D, Proudler, G, eds, Prentice Hall PTR, Upper Saddle River
    • Balacheff, B., Chen, L., Pearson, S., Plaquin, D., Proudler, G. (eds.): Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall PTR, Upper Saddle River (2003)
    • (2003) Trusted Computing Platforms: TCPA Technology in Context
  • 5
    • 42549137149 scopus 로고    scopus 로고
    • November 2006
    • Intel Corporation. Intel trusted execution technology (November 2006), http://download.intel.com/technology/security/downloads/31516803.pdf
    • Intel trusted execution technology
  • 6
    • 57049084682 scopus 로고    scopus 로고
    • Microsoft Corporation. Ngscb official page (2007). http://www.microsoft. com/resources/ngscb/default.mspx
    • (2007) Ngscb official page
  • 8
    • 57049105840 scopus 로고    scopus 로고
    • TCG Best Practices Group. Design, Implementation, and Usage Principles for TPM-Based Platforms. Version 1.0 May 2005
    • TCG Best Practices Group. Design, Implementation, and Usage Principles for TPM-Based Platforms. Version 1.0 (May 2005)
  • 9
    • 3042563843 scopus 로고    scopus 로고
    • Authentication tests and disjoint encryption: A design method for security protocols
    • Guttman, I.D.: Authentication tests and disjoint encryption: a design method for security protocols. Journal of Computer Security 12(3/4), 409-433 (2004)
    • (2004) Journal of Computer Security , vol.12 , Issue.3-4 , pp. 409-433
    • Guttman, I.D.1
  • 10
    • 33646176467 scopus 로고    scopus 로고
    • Guttman, J.D., Herzog, J.C., Ramsdell. J.D., Sniffen, B.T.: Programming cryptographic protocols. In: De Nicola. R., Sangiorgi, D. (eds.) TGC 2005. LNCS. 3705, pp. 116-145. Springer, Heidelberg (2005)
    • Guttman, J.D., Herzog, J.C., Ramsdell. J.D., Sniffen, B.T.: Programming cryptographic protocols. In: De Nicola. R., Sangiorgi, D. (eds.) TGC 2005. LNCS. vol. 3705, pp. 116-145. Springer, Heidelberg (2005)
  • 11
    • 35048867881 scopus 로고    scopus 로고
    • Guttman, J.D., Thayer, F.J., Carlson, J.A., Herzog, J.C., Ramsdell, J.D., Sniffen, B.T.: Trust management in strand spaces: A rely-guarantee method. In: Schmidt, D. (ed.) ESOP 2004. LNCS, 2986, pp. 325-339. Springer, Heidelberg (2004)
    • Guttman, J.D., Thayer, F.J., Carlson, J.A., Herzog, J.C., Ramsdell, J.D., Sniffen, B.T.: Trust management in strand spaces: A rely-guarantee method. In: Schmidt, D. (ed.) ESOP 2004. LNCS, vol. 2986, pp. 325-339. Springer, Heidelberg (2004)
  • 15
    • 78751681870 scopus 로고    scopus 로고
    • Advanced tactic targeted grocer: 'Malware stole Hannaford data
    • 18 March
    • Kerber, R.: Advanced tactic targeted grocer: 'Malware" stole Hannaford data. The Boston Globe p. 1, 18 March (2008)
    • (2008) The Boston Globe , pp. 1
    • Kerber, R.1
  • 16
    • 57049099887 scopus 로고    scopus 로고
    • LOBCOCCO, P., Smalley, S.: Integrating flexible support for security policies into the linux operating system. Technical report, NSA, NAl Labs (April 2001)
    • LOBCOCCO, P., Smalley, S.: Integrating flexible support for security policies into the linux operating system. Technical report, NSA, NAl Labs (April 2001)
  • 17
    • 57049173146 scopus 로고    scopus 로고
    • Milien, J., Guttman, J., Ramsdell, J., Sheehy, J., Sniffen, B.: Call by contract for cryptographic protocol. In: FCS-ARSPA (2006)
    • Milien, J., Guttman, J., Ramsdell, J., Sheehy, J., Sniffen, B.: Call by contract for cryptographic protocol. In: FCS-ARSPA (2006)
  • 18
    • 33751027456 scopus 로고    scopus 로고
    • Trust[ed -in] computing, signed code and the heat death of the internet
    • ACM Press, New York
    • Poritz, J.A.: Trust[ed -in] computing, signed code and the heat death of the internet. In: SAC 2006: Proceedings of the 2006 ACM symposium on Applied computing, pp. 1855-1859. ACM Press, New York (2006)
    • (2006) SAC 2006: Proceedings of the 2006 ACM symposium on Applied computing , pp. 1855-1859
    • Poritz, J.A.1
  • 19
    • 29244450159 scopus 로고    scopus 로고
    • Property-based attestation for computing platforms: Caring about properties, not mechanisms
    • ACM Press. New York
    • Sadeghi, A.-R., Stüble, C.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: NSPW 2004: Proceedings, 2004 Workshop on New Security Paradigms, pp. 67-77. ACM Press. New York (2004)
    • (2004) NSPW 2004: Proceedings, 2004 Workshop on New Security Paradigms , pp. 67-77
    • Sadeghi, A.-R.1    Stüble, C.2
  • 22
    • 27544477855 scopus 로고    scopus 로고
    • Shi, E., Perrig, A., Van Doom, L.: BIND: A time-of-use attestation service for secure distributed systems. In: Proceedings of IEEE Symposium on Security and Privacy (May 2005)
    • Shi, E., Perrig, A., Van Doom, L.: BIND: A time-of-use attestation service for secure distributed systems. In: Proceedings of IEEE Symposium on Security and Privacy (May 2005)
  • 24
    • 57049143785 scopus 로고    scopus 로고
    • Stone, B.: 11 charged in theft of 41 million card numbers. The New York Times, p. B 1, 5 August (2008)
    • Stone, B.: 11 charged in theft of 41 million card numbers. The New York Times, p. B 1, 5 August (2008)
  • 25
    • 57049182549 scopus 로고    scopus 로고
    • Trusted Computing Group, version 1.1b edition
    • Trusted Computing Group. TPM Main Specification, version 1.1b edition (2001), https://www.trustedcomputinggroup.org/downloads/tcg-spec-1-1b.zip
    • (2001) TPM Main Specification
  • 26
    • 57049084115 scopus 로고    scopus 로고
    • Trusted Computing Group. TCG Trusted Network Connect: TNC Architecture for Interoperability. Version 1.1 May 2006
    • Trusted Computing Group. TCG Trusted Network Connect: TNC Architecture for Interoperability. Version 1.1 (May 2006)
  • 27
    • 57049088649 scopus 로고    scopus 로고
    • Trusted Computing Group. TCG Trusted Network Connect TNC IF-IMC, Version 1.1 May 2006
    • Trusted Computing Group. TCG Trusted Network Connect TNC IF-IMC, Version 1.1 (May 2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.