메뉴 건너뛰기




Volumn E91-D, Issue 5, 2008, Pages 1242-1251

Integrity management infrastructure for trusted computing

Author keywords

Integrity management; Trusted computing; Vulnerability management

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 58049186715     PISSN: 09168532     EISSN: 17451361     Source Type: Journal    
DOI: 10.1093/ietisy/e91-d.5.1242     Document Type: Article
Times cited : (6)

References (27)
  • 1
    • 85027113585 scopus 로고    scopus 로고
    • CSI/FBI computer crime and security survey 2006
    • "CSI/FBI computer crime and security survey 2006."
  • 2
    • 85027200176 scopus 로고    scopus 로고
    • Trusted Computing Group
    • Trusted Computing Group, https://www.trustedcomputinggroup.org/
  • 7
    • 33750240268 scopus 로고    scopus 로고
    • Bridging the gap between inter-communication boundary and inside trusted components
    • 11th European Symposium on Research in Computer Security ESORICS, Springer
    • Y. Watanabe, S. Yoshihama, T. Mishina, M. Kudo, and H. Maruyama, "Bridging the gap between inter-communication boundary and inside trusted components," 11th European Symposium on Research in Computer Security (ESORICS 2006), LNCS, Springer, 2006.
    • (2006) LNCS
    • Watanabe, Y.1    Yoshihama, S.2    Mishina, T.3    Kudo, M.4    Maruyama, H.5
  • 10
    • 29244450159 scopus 로고    scopus 로고
    • Property-based attestation for computing platforms: Caring about properties, not mechanisms
    • A. Sadeghi and C. Stüble, "Property-based attestation for computing platforms: Caring about properties, not mechanisms," 2004 Workshop on New Security Paradigms (NSPW 2004), pp.67-77, 2004.
    • (2004) 2004 Workshop on New Security Paradigms (NSPW , pp. 67-77
    • Sadeghi, A.1    Stüble, C.2
  • 11
    • 24644439462 scopus 로고    scopus 로고
    • Property attestation - Scalable and privacy-friendly assessment of peer computers,
    • Technical Report RZ3548, IBM Research Report
    • M.E. Van Herreweghen, J. Poritz, and M.Waidner, "Property attestation - Scalable and privacy-friendly assessment of peer computers," Technical Report RZ3548, IBM Research Report, 2004.
    • (2004)
    • Van Herreweghen, M.E.1    Poritz, J.2    Waidner, M.3
  • 12
    • 68149105674 scopus 로고    scopus 로고
    • WS-attestation: Enabling trusted computing on Web services
    • ed. L. Baresi and E. Di Nitto, pp, Springer Berlin Heidelberg, Sept
    • S. Yoshihama, T. Ebringer, M. Nakamura, S. Munetoh, T. Mishina, and H. Maruyama, "WS-attestation: Enabling trusted computing on Web services," in Test and Analysis of Web Services, ed. L. Baresi and E. Di Nitto, pp.441-469, Springer Berlin Heidelberg, Sept. 2007.
    • (2007) Test and Analysis of Web Services , pp. 441-469
    • Yoshihama, S.1    Ebringer, T.2    Nakamura, M.3    Munetoh, S.4    Mishina, T.5    Maruyama, H.6
  • 13
    • 85027172797 scopus 로고    scopus 로고
    • Trusted Computing Group, TPM main, version 1.2
    • Trusted Computing Group, "TPM main, version 1.2."
  • 14
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a tcg-based integrity measurement architecture
    • Aug
    • R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn, "Design and implementation of a tcg-based integrity measurement architecture," 13th USENIX Security Symposium, pp.223-238, Aug. 2004.
    • (2004) 13th USENIX Security Symposium , pp. 223-238
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    van Doorn, L.4
  • 15
    • 85027197945 scopus 로고    scopus 로고
    • Trusted Computing Group, TCG infrastructure working group architecture Part II, Integrity management, Ver. 1.0, Rev. 1.0, Nov. 2006
    • Trusted Computing Group, "TCG infrastructure working group architecture Part II - Integrity management, Ver. 1.0, Rev. 1.0," Nov. 2006.
  • 18
    • 85027155224 scopus 로고    scopus 로고
    • National vulnerability database
    • "National vulnerability database." http://nvd.nist.gov/
  • 19
    • 85027116674 scopus 로고    scopus 로고
    • Trusted Computing Group, Trusted computing group, platform trust services PTS, Ver. 1.0, Sept. 2006
    • Trusted Computing Group, "Trusted computing group, platform trust services (PTS), Ver. 1.0," Sept. 2006.
  • 20
    • 85027103415 scopus 로고    scopus 로고
    • xen.org. http://xen.org/
    • "xen.org." http://xen.org/
  • 23
    • 70350531758 scopus 로고    scopus 로고
    • TCG PC client specific implementation specification for conventional BIOS, Ver 1.2
    • Trusted Computing Group, July
    • Trusted Computing Group, "TCG PC client specific implementation specification for conventional BIOS, Ver 1.2," July 2005.
    • (2005)
  • 25
    • 58049146195 scopus 로고    scopus 로고
    • "Debian security." http://www.debian.org/security/
    • Debian security
  • 27
    • 85027199452 scopus 로고    scopus 로고
    • N.I. of Advanced Industrial Science and Technology, Knoppix5.1.1 for trusted compuintg geeks. http://unit.aist.go.jp/itri/knoppix/, 2007.
    • N.I. of Advanced Industrial Science and Technology, "Knoppix5.1.1 for trusted compuintg geeks." http://unit.aist.go.jp/itri/knoppix/, 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.