-
1
-
-
34548150241
-
How to implement trusted computing, a guide to tighter enterprise security
-
Roger L Kay. How to Implement Trusted Computing, A Guide to Tighter Enterprise Security [OL]. https://www.trustedcomputinggroup.org/news/Industry-Data/ Implementing-Trusted-Computing-RK.pdf.
-
-
-
Kay, R.L.1
-
2
-
-
78149350129
-
Next-generation secure Application base
-
Microsoft. Next-generation secure Application base [OL]. http://www.microsoft.com/resources/ngscb.
-
-
-
Microsoft1
-
3
-
-
21644486314
-
TCG specification architecture overview, Version1.2
-
TCG
-
TCG. TCG Specification Architecture Overview, Version1.2 [OL]. https://www.trustedcomputinggroup.org, 2004-04-28.
-
(2004)
-
-
-
4
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
Nova Scotia, CANADA. ACM Press, September
-
Ahmad-Reza Sadeghi, Christian Stüble. Property-based attestation for computing platforms: Caring about properties, not mechanisms [A]. in Proceedings of the 2004 workshop on New security paradigms, Nova Scotia, CANADA. ACM Press, September 2004: 66-77.
-
(2004)
Proceedings of the 2004 Workshop on New Security Paradigms
, pp. 66-77
-
-
Sadeghi, A.-R.1
Stüble, C.2
-
5
-
-
24644439462
-
Property attestation-scalable and privacy-friendly security assessment of peer computers
-
IBM Research Report RZ 3548
-
J Poritz, M Schunter, E V Herreweghen, and M Waidner. Property attestation-scalable and privacy-friendly security assessment of peer computers, IBM Research Report RZ 3548, 2004 [OL]. http://domino.watson.ibm.com/library/cyberdig.nsf/papers/ 215E33CB2B4F7FA485256E97002A0D6C/$File/rz3548.pdf.
-
(2004)
-
-
Poritz, J.1
Schunter, M.2
Herreweghen, E.V.3
Waidner, M.4
-
8
-
-
3042738543
-
SWATT: Software-based attestation for embedded devices
-
Oakland, CA, USA: IEEE Press, May
-
A Seshadri, A Perrig, L van Doorn, and P Khosla. SWATT: Software-based attestation for embedded devices [A]. In Proceedings of IEEE Symposium on Security and Privacy [C]. Oakland, CA, USA: IEEE Press, May 2004. 272-282.
-
(2004)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
van Doorn, L.3
Khosla, P.4
-
9
-
-
70349659108
-
Semantic remote attestation-a virtual machine directed approach to trusted computing
-
San Jose, CA, USA: USENIX
-
V Haldar, D Chandra, and M Franz. Semantic remote attestation-a virtual machine directed approach to trusted computing [A]. In Proc. of the Third virtual Machine Research and Technology Symposium [C]. San Jose, CA, USA: USENIX, 2004. 29-41.
-
(2004)
Proc. of the Third Virtual Machine Research and Technology Symposium
, pp. 29-41
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
10
-
-
65149096739
-
-
Chinese source
-
-
-
-
11
-
-
65149091701
-
-
Chinese source
-
-
-
|