메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1-10

Improving the scalability of platform attestation

Author keywords

Attestation protocols; Integrity reporting; Performance; Remote attestation; Scalability; Trusted computing

Indexed keywords

ATTESTATION PROTOCOLS; INTEGRITY REPORTING; PERFORMANCE; REMOTE ATTESTATION; TRUSTED COMPUTING;

EID: 70349256468     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1456455.1456457     Document Type: Conference Paper
Times cited : (38)

References (27)
  • 1
    • 70349231388 scopus 로고    scopus 로고
    • Deliverable 2.3: The high-level protocol specication language
    • AVISPA, Technical report
    • AVISPA. Deliverable 2.3: The high-level protocol specication language. Technical report, http://www.avispa-project.org/delivs/2.1/d2-1.pdf, 2003.
    • (2003)
  • 2
    • 84910156435 scopus 로고    scopus 로고
    • S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn. vtpm: virtualizing the trusted platform module. In USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium, pages 21-21, Berkeley, CA, USA, 2006. USENIX Association.
    • S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn. vtpm: virtualizing the trusted platform module. In USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium, pages 21-21, Berkeley, CA, USA, 2006. USENIX Association.
  • 5
    • 70349248289 scopus 로고    scopus 로고
    • T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.1. Technical report, IETF Network Working Group, 2006
    • T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.1. Technical report, IETF Network Working Group, 2006.
  • 11
    • 38149142765 scopus 로고    scopus 로고
    • C. Krauß, F. Stumpf, and C. Eckert. Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques. In In Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS 2007), Lecture Notes in Computer Science, Cambridge, UK, July 2007. Springer-Verlag.
    • C. Krauß, F. Stumpf, and C. Eckert. Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques. In In Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS 2007), Lecture Notes in Computer Science, Cambridge, UK, July 2007. Springer-Verlag.
  • 12
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • New York, NY, USA, ACM Press
    • L. Lamport. Password authentication with insecure communication. In Commun. ACM, volume 24, pages 770-772, New York, NY, USA, 1981. ACM Press.
    • (1981) Commun. ACM , vol.24 , pp. 770-772
    • Lamport, L.1
  • 17
    • 29244450159 scopus 로고    scopus 로고
    • Property-based attestation for computing platforms: Caring about properties, not mechanisms
    • New York, NY, USA, ACM Press
    • A.-R. Sadeghi and C. Stuble. Property-based attestation for computing platforms: caring about properties, not mechanisms. In NSPW '04: Proceedings of the 2004 workshop on New security paradigms, pages 67-77, New York, NY, USA, 2004. ACM Press.
    • (2004) NSPW '04: Proceedings of the 2004 workshop on New security paradigms , pp. 67-77
    • Sadeghi, A.-R.1    Stuble, C.2
  • 19
    • 27544477855 scopus 로고    scopus 로고
    • BIND: A Fine-Grained Attestation Service for Secure Distributed Systems
    • Washington, DC, USA, IEEE Computer Society
    • E. Shi, A. Perrig, and L. V. Doorn. BIND: A Fine-Grained Attestation Service for Secure Distributed Systems. In SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pages 154-168, Washington, DC, USA, 2005. IEEE Computer Society.
    • (2005) SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy , pp. 154-168
    • Shi, E.1    Perrig, A.2    Doorn, L.V.3
  • 20
    • 37149035513 scopus 로고    scopus 로고
    • An Approach to a Trustworthy System Architecture using Virtualization
    • Proceedings of the 4th International Conference on Autonomic and Trusted Computing ATC-2007, of, Hong Kong, China, Springer-Verlag
    • F. Stumpf, M. Benz, M. Hermanowski, and C. Eckert. An Approach to a Trustworthy System Architecture using Virtualization. In Proceedings of the 4th International Conference on Autonomic and Trusted Computing (ATC-2007), volume 4158 of Lecture Notes in Computer Science, Hong Kong, China, 2007. Springer-Verlag.
    • (2007) Lecture Notes in Computer Science , vol.4158
    • Stumpf, F.1    Benz, M.2    Hermanowski, M.3    Eckert, C.4
  • 21
    • 55849096263 scopus 로고    scopus 로고
    • F. Stumpf and C. Eckert. Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques. In Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2008), Cap Esterel, France, August 25-31, 2008. IEEE Computer Society.
    • F. Stumpf and C. Eckert. Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques. In Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2008), Cap Esterel, France, August 25-31, 2008. IEEE Computer Society.
  • 23
    • 70349235886 scopus 로고    scopus 로고
    • Trusted Computing Group. TCG TPM Specication Version 1.2 Revision 103, Structure of the TPM. Technical report, TCG, 2007
    • Trusted Computing Group. TCG TPM Specication Version 1.2 Revision 103, Structure of the TPM. Technical report, TCG, 2007.
  • 24
    • 70349254489 scopus 로고    scopus 로고
    • Trusted Computing Group. Infrastructure Subject Key Attestation Evidence Extension Version 1.0, Revision 5. Technical report, TCG, 2005
    • Trusted Computing Group. Infrastructure Subject Key Attestation Evidence Extension Version 1.0, Revision 5. Technical report, TCG, 2005.
  • 25
    • 77949578993 scopus 로고    scopus 로고
    • TCG TPM Specication, Architecture Overview
    • Trusted Computing Group, Technical report, TCG, 2007
    • Trusted Computing Group. TCG TPM Specication, Architecture Overview. Technical report, TCG, 2007.
  • 26
    • 54749125032 scopus 로고    scopus 로고
    • Trusted Platform Module (TPM) specications
    • Trusted Computing Group, Technical report, TCG, 2008
    • Trusted Computing Group. Trusted Platform Module (TPM) specications. Technical report, TCG, 2008, https://www.trustedcomputinggroup.org/specs/TPM
  • 27
    • 70349249893 scopus 로고    scopus 로고
    • L. Viganò. Automated Security Protocol Analysis with the AVISPA Tool. In Proceedings of the XXI Mathematical Foundations of Programming Semantics (MFPS'05), 155 of ENTCS, Elsevier, 2005.
    • L. Viganò. Automated Security Protocol Analysis with the AVISPA Tool. In Proceedings of the XXI Mathematical Foundations of Programming Semantics (MFPS'05), volume 155 of ENTCS, Elsevier, 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.