메뉴 건너뛰기




Volumn 3, Issue , 2009, Pages 283-288

On the feasibility of remote attestation for web services

Author keywords

Attestation; Integrity reporting; Software update; Trusted computing; Web services

Indexed keywords

INTEGRITY REPORTING; REMOTE ATTESTATION; SOFTWARE CONFIGURATION; SOFTWARE UPDATES; TRUSTED COMPUTING;

EID: 70849102264     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSE.2009.213     Document Type: Conference Paper
Times cited : (18)

References (20)
  • 1
    • 70849099452 scopus 로고    scopus 로고
    • Trusted Computing Group, [Online]. Available
    • Trusted Computing Group, "Trusted computing group home page, " 2009. [Online]. Available: https://www.trustedcomputinggroup.org/home.
    • (2009) Trusted Computing Group Home Page
  • 3
    • 29244450159 scopus 로고    scopus 로고
    • Property-based attestation for computing platforms: Caring about properties, not mechanisms
    • ACM Press
    • A.-R. Sadeghi and C. Stüble, "Property-based attestation for computing platforms: caring about properties, not mechanisms, " in NSPW '04. ACM Press, 2004, pp. 67-77.
    • (2004) NSPW '04 , pp. 67-77
    • Sadeghi, A.-R.1    Stüble, C.2
  • 4
    • 33751027456 scopus 로고    scopus 로고
    • Trust[ed | in] computing, signed code and the heat death of the internet
    • ACM Press
    • J. A. Poritz, "Trust[ed | in] computing, signed code and the heat death of the internet, " in SAC '06. ACM Press, 2006, pp. 1855-1859.
    • (2006) SAC '06 , pp. 1855-1859
    • Poritz, J.A.1
  • 5
    • 79959566693 scopus 로고    scopus 로고
    • Realizing propertybased attestation and sealing with commonly available hardand software
    • ACM
    • U. Kühn, M. Selhorst, and C. Stüble, "Realizing propertybased attestation and sealing with commonly available hardand software, " in Scalable Trusted Computing. ACM, 2007, pp. 50-57.
    • (2007) Scalable Trusted Computing , pp. 50-57
    • Kühn, U.1    Selhorst, M.2    Stüble, C.3
  • 6
    • 39149110948 scopus 로고    scopus 로고
    • Remote attestation on legacy operating systems with trusted platform modules
    • D. Schellekens, B. Wyseur, and B. Preneel, "Remote attestation on legacy operating systems with trusted platform modules, " in REM 2007, 2008, pp. 59-72.
    • (2008) REM 2007 , pp. 59-72
    • Schellekens, D.1    Wyseur, B.2    Preneel, B.3
  • 7
    • 54249143197 scopus 로고    scopus 로고
    • Practical techniques for operating system attestation
    • ser. LNCS. Springer Berlin/Heidelberg
    • P. England, "Practical techniques for operating system attestation, " in Trust 2008, ser. LNCS. Springer Berlin/Heidelberg, 2008, pp. 1-13.
    • (2008) Trust 2008 , pp. 1-13
    • England, P.1
  • 8
    • 70349659108 scopus 로고    scopus 로고
    • Semantic remote attestation - Virtual machine directed approach to trusted computing
    • USENIX
    • V. Haldar, D. Chandra, and M. Franz, "Semantic Remote Attestation - virtual machine directed approach to trusted computing, " in Virtual Machine Research and Technology Symposium. USENIX, 2004, pp. 29-41.
    • (2004) Virtual Machine Research and Technology Symposium , pp. 29-41
    • Haldar, V.1    Chandra, D.2    Franz, M.3
  • 9
    • 14844291531 scopus 로고    scopus 로고
    • Attestationbased policy enforcement for remote access
    • ACM
    • R. Sailer, T. Jaeger, X. Zhang, and L. van Doorn, "Attestationbased policy enforcement for remote access, " in CCS '04. ACM, 2004, pp. 308-317.
    • (2004) CCS '04 , pp. 308-317
    • Sailer, R.1    Jaeger, T.2    Zhang, X.3    Doorn, L.V.4
  • 11
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a tcg-based integrity measurement architecture
    • R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn, "Design and implementation of a TCG-based integrity measurement architecture, " in USENIX Security Symposium, 2004, pp. 223- 238.
    • (2004) USENIX Security Symposium , pp. 223-238
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    Doorn, L.V.4
  • 12
    • 41549096799 scopus 로고    scopus 로고
    • A practical approach for establishing trust relationships between remote platforms using trusted computing
    • ser. LNCS. Springer
    • K. Dietrich, M. Pirker, T. Vejda, R. Toegl, T. Winkler, and P. Lipp, "A practical approach for establishing trust relationships between remote platforms using trusted computing, " in Trustworthy Global Computing, ser. LNCS. Springer, 2007, pp. 156-168.
    • (2007) Trustworthy Global Computing , pp. 156-168
    • Dietrich, K.1    Pirker, M.2    Vejda, T.3    Toegl, R.4    Winkler, T.5    Lipp, P.6
  • 16
    • 0003262137 scopus 로고    scopus 로고
    • The inevitability of failure: The flawed assumption of security in modern computing environments
    • Loscocco et al., "The inevitability of failure: the flawed assumption of security in modern computing environments, " in National Information Systems Security Conference, 1998.
    • (1998) National Information Systems Security Conference
    • Loscocco1
  • 18
    • 70849096059 scopus 로고    scopus 로고
    • A secure information flow architecture for web service platforms
    • J. Wei, L. Singaravelu, and C. Pu, "A secure information flow architecture for web service platforms, " IEEE Trans. Services Comput., vol. 1, pp. 75-87, 2008.
    • (2008) IEEE Trans. Services Comput , vol.1 , pp. 75-87
    • Wei, J.1    Singaravelu, L.2    Pu, C.3
  • 20
    • 33748062337 scopus 로고    scopus 로고
    • PRIMA: Policy-reduced integrity measurement architecture
    • T. Jaeger, R. Sailer, and U. Shankar, "PRIMA: policy-reduced integrity measurement architecture, " in SACMAT '06, 2006, pp. 19-28.
    • (2006) SACMAT '06 , pp. 19-28
    • Jaeger, T.1    Sailer, R.2    Shankar, U.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.