메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Design and implementation of wireless trusted access protocol for embedded trusted endpoints

Author keywords

Isolation; Security policy; Trusted computing; Trusted network connection

Indexed keywords

INTERNET; MACHINE DESIGN; METROPOLITAN AREA NETWORKS; MOBILE COMPUTING; SECURITY SYSTEMS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 58049092343     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WiCom.2008.1141     Document Type: Conference Paper
Times cited : (3)

References (15)
  • 2
    • 58049125129 scopus 로고    scopus 로고
    • Trusted Mobile Platform Software Architecture Description
    • "Trusted Mobile Platform Software Architecture Description," http://www.trustedmobile.org/TMP-SWA.D-.revl-00.pdf
  • 4
    • 58049127997 scopus 로고    scopus 로고
    • TCG Mobile Reference Architecture Specification version 1.0 Revision 1
    • "TCG Mobile Reference Architecture Specification version 1.0 Revision 1," http://www.Trustedcomputinggroup.org, 2007.
    • (2007)
  • 5
    • 58049129483 scopus 로고    scopus 로고
    • TCG Mobile Trusted Module Specification version 1.0 Revision 1
    • "TCG Mobile Trusted Module Specification version 1.0 Revision 1,"http://www.Trustedcomputinggroup.org, 2007.
    • (2007)
  • 7
    • 85084162270 scopus 로고    scopus 로고
    • Design and Implementation of a TCG-Based integrity Measurement Architecture
    • San Diego, CA
    • R Sailer, X Zhang, T Jaeger, "Design and Implementation of a TCG-Based integrity Measurement Architecture," The 13th Usenix Security Symposium, San Diego, CA, 2004.
    • (2004) The 13th Usenix Security Symposium
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3
  • 10
    • 35048827792 scopus 로고    scopus 로고
    • A. Pashalidis, C.J.Mitchell, Single Sign on Using Trusted Pla tform, In Proceedings of Information Security, 6th Internatio nal Conference, ISC2003, Bristol, UK, 2003, Volume2851 of Lecture Notes in computer Science, Springer-Verlag, 2003, pp 54-68.
    • A. Pashalidis, C.J.Mitchell, "Single Sign on Using Trusted Pla tform," In Proceedings of Information Security, 6th Internatio nal Conference, ISC2003, Bristol, UK, 2003, Volume2851 of Lecture Notes in computer Science, Springer-Verlag, 2003, pp 54-68.
  • 11
    • 58049113693 scopus 로고    scopus 로고
    • Cisco Systems Inc, Network Admission Control Framework Deployment Guide, http://www.cisco.com/application/pdf/en /us/guest/netsol/ns617/ c649/cdccont-0900aecd80417226.pdf, 2007-10-26.
    • Cisco Systems Inc, "Network Admission Control Framework Deployment Guide," http://www.cisco.com/application/pdf/en /us/guest/netsol/ns617/ c649/cdccont-0900aecd80417226.pdf, 2007-10-26.
  • 12
    • 58049109300 scopus 로고    scopus 로고
    • Microsoft, Network Access Protection Platform Architectur e, http://www.microsoft.com/technet/network/nap/naparch.m.spx, 2007-10-26.
    • Microsoft, "Network Access Protection Platform Architectur e," http://www.microsoft.com/technet/network/nap/naparch.m.spx, 2007-10-26.
  • 13
    • 58049130333 scopus 로고    scopus 로고
    • Trusted Computing Group, TCG Trusted Network Connect T NC Architecture for Interoperability Specification Version 1. 1, http://www.trustedcomputing group.org, 2007-05-07.
    • Trusted Computing Group, "TCG Trusted Network Connect T NC Architecture for Interoperability Specification Version 1. 1," http://www.trustedcomputing group.org, 2007-05-07.
  • 14
    • 70749096362 scopus 로고    scopus 로고
    • Trusted Computing Group
    • Trusted Computing Group, "TPM Main Part 1," http://www.trustedcomputinggroup.org, 2006.
    • (2006) TPM Main Part 1
  • 15
    • 58049107264 scopus 로고    scopus 로고
    • Wolfgang Eisenbarth, Security functions on COM Express pl atforms running under Linux, EMBEDDED LINUX, 2007-7-11.
    • Wolfgang Eisenbarth, "Security functions on COM Express pl atforms running under Linux," EMBEDDED LINUX, 2007-7-11.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.