메뉴 건너뛰기




Volumn 33, Issue 3, 2009, Pages 217-245

Trusted computing: Security and applications

Author keywords

Computer security; Trust; Trusted computing

Indexed keywords


EID: 68149092220     PISSN: 01611194     EISSN: 15581586     Source Type: Journal    
DOI: 10.1080/01611190802231140     Document Type: Article
Times cited : (17)

References (94)
  • 1
    • 68149180414 scopus 로고    scopus 로고
    • 3rd Generation Partnership Project (3GPP). 2002. Global System for Mobile Communications (GSM) - Technical Specification Group Services and System Aspects, Sophia Antipolis, France, Personalisation of mobile equipment (ME), Mobile functionality specification (release 5).
    • 3rd Generation Partnership Project (3GPP). 2002. Global System for Mobile Communications (GSM) - Technical Specification Group Services and System Aspects, Sophia Antipolis, France, Personalisation of mobile equipment (ME), Mobile functionality specification (release 5).
  • 3
    • 1142305232 scopus 로고    scopus 로고
    • Cryptography and competition policy - Issues with trusted computing
    • July 13-16, Boston, Massachsetts, USA, ACM, pp
    • Anderson, R. 2003. Cryptography and competition policy - Issues with "trusted computing," Proceedings of PODC '03, July 13-16, 2003, Boston, Massachsetts, USA, ACM, pp. 3-10.
    • (2003) Proceedings of PODC '03 , pp. 3-10
    • Anderson, R.1
  • 4
    • 85008038596 scopus 로고    scopus 로고
    • Improving the TCPA Specification
    • Arbaugh, B. 2002. "Improving the TCPA Specification," IEEE Computer 35(8):77-79.
    • (2002) IEEE Computer , vol.35 , Issue.8 , pp. 77-79
    • Arbaugh, B.1
  • 5
    • 0030672130 scopus 로고    scopus 로고
    • Arbaugh, W. A., D. J. Farber, and J. M. Smith. 1997. A Secure and Reliable Bootstrap Architecture. In Proceedings of the 1997 IEEE Symposium on Security and Privacy (S&P 1997) (Oakland, California, USA). Los Alamitos, California: IEEE Computer Society Press, pp. 65-71.
    • Arbaugh, W. A., D. J. Farber, and J. M. Smith. 1997. A Secure and Reliable Bootstrap Architecture. In Proceedings of the 1997 IEEE Symposium on Security and Privacy (S&P 1997) (Oakland, California, USA). Los Alamitos, California: IEEE Computer Society Press, pp. 65-71.
  • 9
    • 68149164217 scopus 로고    scopus 로고
    • Challenges for Trusted Computing
    • Tech. Report RHUL-MA-2008-14, Department of Mathematics, Royal Holloway, University of London
    • Balfe, S., E. Gallery, C. J. Mitchell, and K. G. Paterson. 2008. Challenges for Trusted Computing. Tech. Report RHUL-MA-2008-14, Department of Mathematics, Royal Holloway, University of London.
    • (2008)
    • Balfe, S.1    Gallery, E.2    Mitchell, C.J.3    Paterson, K.G.4
  • 10
    • 68149125013 scopus 로고    scopus 로고
    • Crimeware and Trusted Computing
    • edited by M. Jakobsson and Z. Ramzan. Upper Saddle River, NJ: Addison-Wesley, pp
    • Balfe, S., E. Gallery, C. J. Mitchell, and K. G. Paterson. 2008. Crimeware and Trusted Computing. In Crimeware: Understanding New Attacks and Defenses, edited by M. Jakobsson and Z. Ramzan. Upper Saddle River, NJ: Addison-Wesley, pp. 457-472.
    • (2008) Crimeware: Understanding New Attacks and Defenses , pp. 457-472
    • Balfe, S.1    Gallery, E.2    Mitchell, C.J.3    Paterson, K.G.4
  • 11
    • 85013594843 scopus 로고    scopus 로고
    • Securing Peer-to-Peer Networks using Trusted Computing
    • edited by C. J. Mitchell. London: IEE Press, pp
    • Balfe, S., A. D. Lakhani, and K. G. Paterson. 2005. Securing Peer-to-Peer Networks using Trusted Computing. In Trusted Computing edited by C. J. Mitchell. London: IEE Press, pp. 271-298.
    • (2005) Trusted Computing , pp. 271-298
    • Balfe, S.1    Lakhani, A.D.2    Paterson, K.G.3
  • 12
    • 68149178144 scopus 로고    scopus 로고
    • Augmenting internet-based card notpresent transactions with trusted computing: An analysis
    • Tech. Report RHUL-MA-2006-9, Department of Mathematics, Royal Holloway, University of London
    • S. Balfe and K. G. Paterson. 2005. Augmenting internet-based card notpresent transactions with trusted computing: An analysis. Tech. Report RHUL-MA-2006-9, Department of Mathematics, Royal Holloway, University of London.
    • (2005)
    • Balfe, S.1    Paterson, K.G.2
  • 13
    • 68149183122 scopus 로고    scopus 로고
    • Balfe, S. and K. G. Paterson. 2005. e-EMV: Emulating EMV for internet payments using trusted computing technology. Tech. Report RHUL-MA-2006-10, Department of Mathematics, Royal Holloway, University of London.
    • Balfe, S. and K. G. Paterson. 2005. e-EMV: Emulating EMV for internet payments using trusted computing technology. Tech. Report RHUL-MA-2006-10, Department of Mathematics, Royal Holloway, University of London.
  • 15
    • 68149180413 scopus 로고    scopus 로고
    • Brickell, E., J. Camenisch, and L. Chen. June 2004. Direct anonymous attestation, Tech. Report HPL-2004-93, Hewlett-Packard Laboratories, Available at http://www.hpl.hp.com/techreports/. (Accessed May 20, 2009)
    • Brickell, E., J. Camenisch, and L. Chen. June 2004. Direct anonymous attestation, Tech. Report HPL-2004-93, Hewlett-Packard Laboratories, Available at http://www.hpl.hp.com/techreports/. (Accessed May 20, 2009)
  • 16
    • 14844295011 scopus 로고    scopus 로고
    • Direct Anonymous Attestation
    • edited by B. Pfitzmann and P. Liu. ACM Press, pp
    • Brickell, E., J. Camenisch, and L. Chen. 2004. Direct Anonymous Attestation. In Proceedings of CCS '04, edited by B. Pfitzmann and P. Liu. ACM Press, pp. 132-145.
    • (2004) Proceedings of CCS '04 , pp. 132-145
    • Brickell, E.1    Camenisch, J.2    Chen, L.3
  • 17
    • 85013604515 scopus 로고    scopus 로고
    • The DAA scheme in context
    • edited by C. J. Mitchell. London: IEE Press, pp
    • Brickell, E., J. Camenisch, and L. Chen. 2005. The DAA scheme in context. In Trusted Computing, edited by C. J. Mitchell. London: IEE Press, pp. 143-174.
    • (2005) Trusted Computing , pp. 143-174
    • Brickell, E.1    Camenisch, J.2    Chen, L.3
  • 18
    • 35048847167 scopus 로고    scopus 로고
    • Better privacy for trusted computing platforms (extended abstract). Computer Security - ESORICS 2004
    • 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, P. Samarati, D. Gollmann, and R. Molva, eds, Berlin: Springer-Verlag
    • Camenisch, J. 2004. Better privacy for trusted computing platforms (extended abstract). Computer Security - ESORICS 2004, 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, In P. Samarati, D. Gollmann, and R. Molva, eds., Lecture Notes in Computer Science, Berlin: Springer-Verlag, Vol. 3193 pp. 73-88.
    • (2004) Lecture Notes in Computer Science , vol.3193 , pp. 73-88
    • Camenisch, J.1
  • 22
    • 0028533131 scopus 로고
    • BITS: A smartcard protected operating system
    • P. C. Clark and L. J. Hoffman. 1994. "BITS: A smartcard protected operating system," Communications of the ACM, 37:66-94.
    • (1994) Communications of the ACM , vol.37 , pp. 66-94
    • Clark, P.C.1    Hoffman, L.J.2
  • 24
    • 34547468412 scopus 로고    scopus 로고
    • Towards an Open, Trusted Digital Rights Management Platform
    • Alexandria, Virginia, USA, October 30, ACM Press, pp
    • A. Cooper and A. Martin. 2006. Towards an Open, Trusted Digital Rights Management Platform. In Proceedings of the ACM Workshop on Digital Rights Management (DRM '06), Alexandria, Virginia, USA, October 30, 2006, ACM Press, pp. 79-88.
    • (2006) Proceedings of the ACM Workshop on Digital Rights Management (DRM '06) , pp. 79-88
    • Cooper, A.1    Martin, A.2
  • 25
    • 35248895553 scopus 로고    scopus 로고
    • Privacy preserving trust agents
    • Tech. Report HPL-2004-197, Bristol, UK: Hewlett-Packard Laboratories
    • Crane, S. 2004. Privacy preserving trust agents. Tech. Report HPL-2004-197, Bristol, UK: Hewlett-Packard Laboratories.
    • (2004)
    • Crane, S.1
  • 27
    • 68149099360 scopus 로고    scopus 로고
    • EMVCo. 2004. Book 1, Application independent ICC to terminal interface requirements. Version 4.1
    • EMVCo. 2004. Book 1 - Application independent ICC to terminal interface requirements. Version 4.1.
  • 28
    • 68149100324 scopus 로고    scopus 로고
    • EMVCo. Book 2, Security and Key Management. Version 4.1
    • EMVCo. Book 2 - Security and Key Management. Version 4.1.
  • 30
    • 68149184032 scopus 로고    scopus 로고
    • EMVCo. Book 4, Cardholder, Attendant, and Acquirer Interface Requirements. Version 4.1
    • EMVCo. Book 4 - Cardholder, Attendant, and Acquirer Interface Requirements. Version 4.1.
  • 32
    • 84947424562 scopus 로고    scopus 로고
    • England, P. and M. Peinado. 2002. Authenticated operation of open computing devices. Information Security and Privacy, 7th Australasian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, In L. Batten and J. Seberry, eds., Lecture Notes in Computer Science. Berlin: Springer-Verlag, pp. 346-361.
    • England, P. and M. Peinado. 2002. Authenticated operation of open computing devices. Information Security and Privacy, 7th Australasian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, In L. Batten and J. Seberry, eds., Lecture Notes in Computer Science. Berlin: Springer-Verlag, pp. 346-361.
  • 34
    • 38049038742 scopus 로고    scopus 로고
    • Authorisation issues for mobile code in mobile systems
    • Tech. Report RHUL-MA-2007-3, Department of Mathematics, Royal Holloway, University of London
    • Gallery, E. 2007. Authorisation issues for mobile code in mobile systems. Tech. Report RHUL-MA-2007-3, Department of Mathematics, Royal Holloway, University of London.
    • (2007)
    • Gallery, E.1
  • 35
    • 68149160671 scopus 로고    scopus 로고
    • Gallery, E. and A. Tomlinson. 2005. Protection of downloadable software on SDR devices. In Proceedings of the 4th Software Defined Radio Forum Technical Conference (SDR 2005), (Orange County, California, USA), Software Defined Radio Forum (SDRF).
    • Gallery, E. and A. Tomlinson. 2005. Protection of downloadable software on SDR devices. In Proceedings of the 4th Software Defined Radio Forum Technical Conference (SDR 2005), (Orange County, California, USA), Software Defined Radio Forum (SDRF).
  • 36
    • 85013580835 scopus 로고    scopus 로고
    • Secure delivery of conditional access applications to mobile receivers
    • edited by C. J. Mitchell. London, UK: The Institute of Electrical Engineers IEE, pp
    • Gallery, E. and A. Tomlinson. 2005. Secure delivery of conditional access applications to mobile receivers. In Trusted Computing, edited by C. J. Mitchell. London, UK: The Institute of Electrical Engineers (IEE), pp. 195-238.
    • (2005) Trusted Computing , pp. 195-238
    • Gallery, E.1    Tomlinson, A.2
  • 38
    • 0036684150 scopus 로고    scopus 로고
    • PKI: It's Not Dead, Just Resting
    • Gutmann, P. 2002. "PKI: It's Not Dead, Just Resting," IEEE Computer 35(8):41-49.
    • (2002) IEEE Computer , vol.35 , Issue.8 , pp. 41-49
    • Gutmann, P.1
  • 39
    • 24944584954 scopus 로고    scopus 로고
    • LaGrande technology architectural overview
    • Intel, Tech. Report 252491-001, Intel Corporation
    • Intel. 2003. LaGrande technology architectural overview. Tech. Report 252491-001, Intel Corporation.
    • (2003)
  • 42
    • 84958776015 scopus 로고    scopus 로고
    • Itoi, N., W. A. Arbaugh, S. J. Pollack, and D. M. Reeves. 2001. Personal secure booting. Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13 2001, Proceedings. In V. Varadharajan and Y. Mu, eds., Lecture Notes in Computer Science Berlin: Springer-Verlag, 2119, pp. 130-144.
    • Itoi, N., W. A. Arbaugh, S. J. Pollack, and D. M. Reeves. 2001. Personal secure booting. Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13 2001, Proceedings. In V. Varadharajan and Y. Mu, eds., Lecture Notes in Computer Science Berlin: Springer-Verlag, Vol. 2119, pp. 130-144.
  • 43
    • 84955566566 scopus 로고    scopus 로고
    • Kinateder, M. and S. Pearson. 2003. A privacy-enhanced peer-to-peer reputation system. E-Commerce and Web Technologies, 4th International Conference, EC-Web, Prague, Czech Republic, September 2-5, 2003, Proceedings. In K. Bauknecht, A. Min Tjoa, and G. Quirchmayr, eds., Lecture Notes in Computer Science. Berlin: Springer-Verlag, pp. 206-216.
    • Kinateder, M. and S. Pearson. 2003. A privacy-enhanced peer-to-peer reputation system. E-Commerce and Web Technologies, 4th International Conference, EC-Web, Prague, Czech Republic, September 2-5, 2003, Proceedings. In K. Bauknecht, A. Min Tjoa, and G. Quirchmayr, eds., Lecture Notes in Computer Science. Berlin: Springer-Verlag, pp. 206-216.
  • 45
    • 68149170354 scopus 로고    scopus 로고
    • On a possible privacy flaw in Direct Anonymous Attestation (DAA)
    • Tech. Report RHUL-MA-2007-10, Mathematics Department, Royal Holloway, University of London
    • Leung, A., L. Chen, and C. J. Mitchell. 2007. On a possible privacy flaw in Direct Anonymous Attestation (DAA). Tech. Report RHUL-MA-2007-10, Mathematics Department, Royal Holloway, University of London.
    • (2007)
    • Leung, A.1    Chen, L.2    Mitchell, C.J.3
  • 46
    • 27544437127 scopus 로고    scopus 로고
    • Ph.D. thesis, Department of Electrical Engineering, Stanford University, Stanford, California, USA, December
    • Lie, D. 2003. Architectural support for copy and tamper resistant software, Ph.D. thesis, Department of Electrical Engineering, Stanford University, Stanford, California, USA, December 2003.
    • (2003) Architectural support for copy and tamper resistant software
    • Lie, D.1
  • 48
    • 38049040255 scopus 로고    scopus 로고
    • Enhancing Grid security using trusted virtualization
    • Proceedings of the 4th International Conference on Autonomic and Trusted Computing ATC, Berlin: Springer-Verlag
    • Löhr, H., H. V. Ramasamy, A.-R. Sadeghi, S. Schulz, M. Schunter, and C. Stüble. 2007. Enhancing Grid security using trusted virtualization. Proceedings of the 4th International Conference on Autonomic and Trusted Computing (ATC 2007), Lecture Notes in Computer Science. Berlin: Springer-Verlag, Vol. 4610, pp. 372-384.
    • (2007) Lecture Notes in Computer Science , vol.4610 , pp. 372-384
    • Löhr, H.1    Ramasamy, H.V.2    Sadeghi, A.-R.3    Schulz, S.4    Schunter, M.5    Stüble, C.6
  • 52
    • 84942776290 scopus 로고    scopus 로고
    • Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services
    • September 1-5, Prague, Czech Republic: IEEE Computer Society, pp
    • Mont, M. C., S. Pearson, and P. Bramhall. 2003. Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services. 14th International Workshop on Database and Expert Systems Applications (DEXA '03), September 1-5, 2003, Prague, Czech Republic: IEEE Computer Society, pp. 377-382.
    • (2003) 14th International Workshop on Database and Expert Systems Applications (DEXA '03) , pp. 377-382
    • Mont, M.C.1    Pearson, S.2    Bramhall, P.3
  • 53
    • 0142250282 scopus 로고    scopus 로고
    • Towards accountable management of privacy and identity information. Computer Security - ESORICS 2003
    • 8th European Symposium on Research in Computer Security, Gjövik, Norway, October 13-15, 2003, Proceedings, In E. Snekkenes and D. Gollmann, eds, Berlin: Springer-Verlag
    • Mont, M. C., S. Pearson, and P. Bramhall. 2003. Towards accountable management of privacy and identity information. Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjövik, Norway, October 13-15, 2003, Proceedings. (In E. Snekkenes and D. Gollmann, eds.), Lecture Notes in Computer Science, Berlin: Springer-Verlag, Vol. 2808, pp. 146-161.
    • (2003) Lecture Notes in Computer Science , vol.2808 , pp. 146-161
    • Mont, M.C.1    Pearson, S.2    Bramhall, P.3
  • 56
    • 68149164033 scopus 로고    scopus 로고
    • The Open Mobile Alliance. 2004. DRM architecture v2.0. July 2004, San Diego: OMA.
    • The Open Mobile Alliance. 2004. DRM architecture v2.0. July 2004, San Diego: OMA.
  • 57
    • 35048827792 scopus 로고    scopus 로고
    • A. Pashalidis and C. J. Mitchell. 2003. Single sign-on using trusted platforms. Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings. In C. Boyd and W. Mao, eds., Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2851, pp. 54-68.
    • A. Pashalidis and C. J. Mitchell. 2003. Single sign-on using trusted platforms. Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings. In C. Boyd and W. Mao, eds., Lecture Notes in Computer Science. Berlin: Springer-Verlag, Vol. 2851, pp. 54-68.
  • 58
    • 2442419307 scopus 로고    scopus 로고
    • Trusted Agents that Enhance user Privacy by Self-Profiling
    • Tech. Report HPL-2002-196, Bristol, UK: Hewlett-Packard Laboratories, July
    • Pearson, S. 2002. Trusted Agents that Enhance user Privacy by Self-Profiling. Tech. Report HPL-2002-196, Bristol, UK: Hewlett-Packard Laboratories, July 2002.
    • (2002)
    • Pearson, S.1
  • 60
    • 17644388294 scopus 로고    scopus 로고
    • Trusted computing platforms, the Next security solution
    • Pearson, S. ed, Tech. Report HPL-2002-221, Hewlett-Packard Laboratories, November, Accessed May 20, 2009
    • Pearson, S. ed. 2002. Trusted computing platforms, the Next security solution. Tech. Report HPL-2002-221, Hewlett-Packard Laboratories, November 2002, http://www.hpl.hp.com/techreports/. (Accessed May 20, 2009).
    • (2002)
  • 62
    • 33646445517 scopus 로고    scopus 로고
    • Peinado, M., Y. Chen, P. England, and J. Manferdelli. 2004. NGSCB: A trusted open system. Information Security and Privacy, 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings. In H. Wang, J. Pieprzyk, and V. Varadharajan, eds., Lecture Notes in Computer Science. Berlin: Springer-Verlag, 3108, pp. 86-97.
    • Peinado, M., Y. Chen, P. England, and J. Manferdelli. 2004. NGSCB: A trusted open system. Information Security and Privacy, 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings. In H. Wang, J. Pieprzyk, and V. Varadharajan, eds., Lecture Notes in Computer Science. Berlin: Springer-Verlag, Vol. 3108, pp. 86-97.
  • 63
    • 85013587012 scopus 로고    scopus 로고
    • An overview of NGSCB, Trusted Computing
    • edited by C. J. Mitchell. London: The Institute of Electrical Engineers IEE, pp
    • Peinado, M., P. England, and Y. Chen. 2005. An overview of NGSCB, Trusted Computing. In IEE Professional Applications of Computing Series 6, edited by C. J. Mitchell. London: The Institute of Electrical Engineers (IEE), pp. 115-141.
    • (2005) IEE Professional Applications of Computing Series , vol.6 , pp. 115-141
    • Peinado, M.1    England, P.2    Chen, Y.3
  • 64
    • 0013347999 scopus 로고    scopus 로고
    • The PERSEUS system architecture
    • 3335, 93381, IBM Research Division, Zurich Laboratory, April
    • Pfitzmann, B., J. Riordan, C. Stuble, M. Waidner, and A. Weber. 2001. The PERSEUS system architecture. Tech. Report RZ 3335 (#93381), IBM Research Division, Zurich Laboratory, April 2001.
    • (2001) Tech. Report RZ
    • Pfitzmann, B.1    Riordan, J.2    Stuble, C.3    Waidner, M.4    Weber, A.5
  • 65
    • 33750903968 scopus 로고    scopus 로고
    • PKI - An insider's view (extended abstract)
    • Technical Report RHULMA-2005-8, Department of Mathematics, Royal Holloway, University of London, June
    • Price, G. 2005. PKI - An insider's view (extended abstract). Technical Report RHULMA-2005-8, Department of Mathematics, Royal Holloway, University of London, June 2005.
    • (2005)
    • Price, G.1
  • 68
    • 36248950111 scopus 로고    scopus 로고
    • Rudolph, C. 2007. Covert identity information in Direct Anonymous Attestation (DAA), New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa. In H. Venter, M. Eloff, L. Lebuschagne, J. Eloff, and R. von Solms, eds., IFIP International Federation for Information Processing, Boston: Springer, 232, pp. 443-448.
    • Rudolph, C. 2007. Covert identity information in Direct Anonymous Attestation (DAA), New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa. In H. Venter, M. Eloff, L. Lebuschagne, J. Eloff, and R. von Solms, eds., IFIP International Federation for Information Processing, Boston: Springer, Vol. 232, pp. 443-448.
  • 70
    • 29244450159 scopus 로고    scopus 로고
    • Property-based attestation for computing platforms: Caring about properties, not mechanisms
    • C. F. Hempelmann, ed, New York: ACM, pp
    • Sadeghi, A.-R. and C. Stüble. 2004. Property-based attestation for computing platforms: Caring about properties, not mechanisms. In C. F. Hempelmann, ed., Proceedings of the 2004 Workshop on New Security Paradigms (NSPW 2004). New York: ACM, pp. 67-77.
    • (2004) Proceedings of the 2004 Workshop on New Security Paradigms (NSPW 2004) , pp. 67-77
    • Sadeghi, A.-R.1    Stüble, C.2
  • 71
    • 35048881059 scopus 로고    scopus 로고
    • Sadeghi, A.-R. and C. Stüble. 2004. Taming trusted platforms by operating system design. Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers. In K. Chae and M. Yung, eds., Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2908, pp. 286-302.
    • Sadeghi, A.-R. and C. Stüble. 2004. Taming "trusted platforms" by operating system design. Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers. In K. Chae and M. Yung, eds., Lecture Notes in Computer Science. Berlin: Springer-Verlag, Vol. 2908, pp. 286-302.
  • 74
    • 68149157835 scopus 로고    scopus 로고
    • Schechter, S. E., R. A. Greenstadt, and M. D. Smith. 2003. Trusted computing, peer-to-peer distribution, and the economics of pirated entertainment. In Proceedings of the Second Annual Workshop on Economics and Information Security. College Park, MD, May 29-30.
    • Schechter, S. E., R. A. Greenstadt, and M. D. Smith. 2003. Trusted computing, peer-to-peer distribution, and the economics of pirated entertainment. In Proceedings of the Second Annual Workshop on Economics and Information Security. College Park, MD, May 29-30.
  • 75
    • 38149070279 scopus 로고    scopus 로고
    • Smyth, B., M. Ryan, and L. Chen. 2007. Direct anonymous attestation (DAA): Ensuring privacy with corrupt administrators. Security and Privacy in Ad-hoc and Sensor Networks: 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings In F. Stajano, C. Meadows, S. Capkun, and T. Moore, eds., Lecture Notes in Computer Science, Berlin: Springer-Verlag, 4572, pp. 218-231.
    • Smyth, B., M. Ryan, and L. Chen. 2007. Direct anonymous attestation (DAA): Ensuring privacy with corrupt administrators. Security and Privacy in Ad-hoc and Sensor Networks: 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings In F. Stajano, C. Meadows, S. Capkun, and T. Moore, eds., Lecture Notes in Computer Science, Berlin: Springer-Verlag, Vol. 4572, pp. 218-231.
  • 77
    • 84904269073 scopus 로고    scopus 로고
    • Protecting the creation of digital signatures with trusted computing platform technology against attacks by Trojan Horse programs. Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on Information Security (IFIP=Sec '01), June 11-13, 2001, Paris, France
    • M. Dupuy and P. Paradinas, eds, Boston: Kluwer Academic Publishers
    • Spalka, A., A. B. Cremers, and H. Langweg. 2001. Protecting the creation of digital signatures with trusted computing platform technology against attacks by Trojan Horse programs. Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on Information Security (IFIP=Sec '01), June 11-13, 2001, Paris, France. In M. Dupuy and P. Paradinas, eds., IFIP Conference Proceedings. Boston: Kluwer Academic Publishers, Vol. 193, pp. 403-419.
    • (2001) IFIP Conference Proceedings , vol.193 , pp. 403-419
    • Spalka, A.1    Cremers, A.B.2    Langweg, H.3
  • 78
    • 43649103310 scopus 로고    scopus 로고
    • A security assessment of trusted platform modules
    • Tech. Report TR-2007-597, Department of Computer Science, Dartmouth College, Jun
    • Sparks, E. 2007. A security assessment of trusted platform modules. Tech. Report TR-2007-597, Department of Computer Science, Dartmouth College, Jun 2007.
    • (2007)
    • Sparks, E.1
  • 79
    • 1142280988 scopus 로고    scopus 로고
    • The AEGIS processor architecture for tamper-evident and tamper-resistant processing
    • 23-26 June, San Francisco, California, USA, New York: ACM Press, pp
    • Suh, E., D. Clarke, B. Gassend, M. van Dyke, and S. Devadas. 2003. The AEGIS processor architecture for tamper-evident and tamper-resistant processing, In 17th Annual ACM International Conference on Supercomputing (ICS '03) 23-26 June 2003, San Francisco, California, USA, New York: ACM Press, pp. 160-171.
    • (2003) 17th Annual ACM International Conference on Supercomputing (ICS '03) , pp. 160-171
    • Suh, E.1    Clarke, D.2    Gassend, B.3    van Dyke, M.4    Devadas, S.5
  • 80
    • 68149125004 scopus 로고    scopus 로고
    • Trusted Computing Group. 2005. Mobile Phone Working Group, Portland. OR, Use case scenarios, September 2005, Version 2.7
    • Trusted Computing Group. 2005. Mobile Phone Working Group, Portland. OR, Use case scenarios, September 2005, Version 2.7.
  • 81
    • 68149100325 scopus 로고    scopus 로고
    • Trusted Computing Group (TCG). 2005. Portland, OR, TCG PC client specific implementation specification for conventional BIOS July 2005, Version 1.2 Final.
    • Trusted Computing Group (TCG). 2005. Portland, OR, TCG PC client specific implementation specification for conventional BIOS July 2005, Version 1.2 Final.
  • 82
    • 68149180142 scopus 로고    scopus 로고
    • Trusted Computing Group (TCG). 2006. Beaverton, OR, Mobile trusted module specification overview document.
    • Trusted Computing Group (TCG). 2006. Beaverton, OR, Mobile trusted module specification overview document.
  • 83
    • 68149171249 scopus 로고    scopus 로고
    • Trusted Computing Group TCG, 2006. Portland, OR, TCG EFI platform, for TPM family 1.1 or 1.2 June 2006, Version 1.2 Final
    • Trusted Computing Group (TCG). 2006. Portland, OR, TCG EFI platform - for TPM family 1.1 or 1.2 June 2006, Version 1.2 Final.
  • 84
    • 68149163045 scopus 로고    scopus 로고
    • Trusted Computing Group (TCG). 2006. Portland, OR, The TCG mobile trusted module specification September 2006.
    • Trusted Computing Group (TCG). 2006. Portland, OR, The TCG mobile trusted module specification September 2006.
  • 85
    • 68149156847 scopus 로고    scopus 로고
    • Trusted Computing Group TCG, 2006. Portland, OR, TPM main, Part 1: Design principles March 2006, Version 1.2 Revision 94
    • Trusted Computing Group (TCG). 2006. Portland, OR, TPM main, Part 1: Design principles March 2006, Version 1.2 Revision 94.
  • 86
    • 68149160670 scopus 로고    scopus 로고
    • Trusted Computing Group TCG, 2006. Portland, OR, TPM main, Part 2: TPM data structures March 2006, Version 1.2 Revision 94
    • Trusted Computing Group (TCG). 2006. Portland, OR, TPM main, Part 2: TPM data structures March 2006, Version 1.2 Revision 94.
  • 87
    • 68149165256 scopus 로고    scopus 로고
    • Trusted Computing Group TCG, 2006. Portland, OR, TPM Main, Part 3: Commands March 2006, Version 1.2 Revision 94
    • Trusted Computing Group (TCG). 2006. Portland, OR, TPM Main, Part 3: Commands March 2006, Version 1.2 Revision 94.
  • 88
    • 68149173239 scopus 로고    scopus 로고
    • Trusted Computing Group TCG, 2007. Portland, OR, TCG credential profiles May 2007, Version 1.1 Revision 1.014 For TPM Family 1, 2; Level 2
    • Trusted Computing Group (TCG). 2007. Portland, OR, TCG credential profiles May 2007, Version 1.1 Revision 1.014 For TPM Family 1, 2; Level 2.
  • 89
    • 68149125977 scopus 로고    scopus 로고
    • Trusted Computing Group (TCG). 2007. Portland, OR, TNC architecture for interoperability September 2007.
    • Trusted Computing Group (TCG). 2007. Portland, OR, TNC architecture for interoperability September 2007.
  • 90
    • 0038650651 scopus 로고
    • Dyad: A system for using physically secure coprocessors
    • Technical Report CMU-CS-91-140R, Carnigie Mellon University, Pittsburgh, PA, May
    • Tygar, J. and B. Yee. 1991. Dyad: A system for using physically secure coprocessors, Technical Report CMU-CS-91-140R, Carnigie Mellon University, Pittsburgh, PA, May 1991.
    • (1991)
    • Tygar, J.1    Yee, B.2
  • 91
    • 33646754186 scopus 로고    scopus 로고
    • Finding collisions in the full SHA-1 Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005
    • Proceedings, V. Shoup, ed, Berlin: Springer
    • Wang, X., Y. L. Yin, and X. Yu. 2005. Finding collisions in the full SHA-1 Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings. In V. Shoup, ed., Lecture Notes in Computer Science. Berlin: Springer, vol. 3621, pp. 17-36.
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 17-36
    • Wang, X.1    Yin, Y.L.2    Yu, X.3
  • 92
    • 84982994321 scopus 로고    scopus 로고
    • Introducing trusted third parties to the mobile agent paradigm. Secure Internet Programming: Security Issues for Mobile and Distributed Objects
    • J. Vitek and C. Jensen, eds, Berlin: Springer-Verlag
    • Wilhelm, U. G., S. Staamann, and L. Butty. 1999. Introducing trusted third parties to the mobile agent paradigm. Secure Internet Programming: Security Issues for Mobile and Distributed Objects. In J. Vitek and C. Jensen, eds., Lecture Notes In Computer Science. Berlin: Springer-Verlag, vol. 1603, pp. 469-489.
    • (1999) Lecture Notes In Computer Science , vol.1603 , pp. 469-489
    • Wilhelm, U.G.1    Staamann, S.2    Butty, L.3
  • 93
    • 24944497930 scopus 로고    scopus 로고
    • A method for trust sustainability among trusted computing platforms. Trust and Privacy in Digital Business: First International Conference, Trust-Bus 2004, Zaragoza, Spain, August 30 - September 1, 2004
    • Proceedings, S. Katsikas, J. Lopez, and G. Pernul, eds, Berlin: Springer- Verlag
    • Yan, Z. and Z. Cofta. 2004. A method for trust sustainability among trusted computing platforms. Trust and Privacy in Digital Business: First International Conference, Trust-Bus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings. In S. Katsikas, J. Lopez, and G. Pernul, eds., Lecture Notes in Computer Science. Berlin: Springer- Verlag, Vol. 3184, pp. 11-19.
    • (2004) Lecture Notes in Computer Science , vol.3184 , pp. 11-19
    • Yan, Z.1    Cofta, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.