-
1
-
-
70849099452
-
-
Trusted Computing Group, [Online]. Available
-
Trusted Computing Group, "Trusted computing group home page, " 2009. [Online]. Available: https://www.trustedcomputinggroup.org/home.
-
(2009)
Trusted Computing Group Home Page
-
-
-
3
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
ACM Press
-
A.-R. Sadeghi and C. Stüble, "Property-based attestation for computing platforms: caring about properties, not mechanisms, " in NSPW '04. ACM Press, 2004, pp. 67-77.
-
(2004)
NSPW '04
, pp. 67-77
-
-
Sadeghi, A.-R.1
Stüble, C.2
-
4
-
-
33751027456
-
Trust[ed | in] computing, signed code and the heat death of the internet
-
ACM Press
-
J. A. Poritz, "Trust[ed | in] computing, signed code and the heat death of the internet, " in SAC '06. ACM Press, 2006, pp. 1855-1859.
-
(2006)
SAC '06
, pp. 1855-1859
-
-
Poritz, J.A.1
-
5
-
-
79959566693
-
Realizing propertybased attestation and sealing with commonly available hardand software
-
ACM
-
U. Kühn, M. Selhorst, and C. Stüble, "Realizing propertybased attestation and sealing with commonly available hardand software, " in Scalable Trusted Computing. ACM, 2007, pp. 50-57.
-
(2007)
Scalable Trusted Computing
, pp. 50-57
-
-
Kühn, U.1
Selhorst, M.2
Stüble, C.3
-
6
-
-
39149110948
-
Remote attestation on legacy operating systems with trusted platform modules
-
D. Schellekens, B. Wyseur, and B. Preneel, "Remote attestation on legacy operating systems with trusted platform modules, " in REM 2007, 2008, pp. 59-72.
-
(2008)
REM 2007
, pp. 59-72
-
-
Schellekens, D.1
Wyseur, B.2
Preneel, B.3
-
7
-
-
54249143197
-
Practical techniques for operating system attestation
-
ser. LNCS. Springer Berlin/Heidelberg
-
P. England, "Practical techniques for operating system attestation, " in Trust 2008, ser. LNCS. Springer Berlin/Heidelberg, 2008, pp. 1-13.
-
(2008)
Trust 2008
, pp. 1-13
-
-
England, P.1
-
8
-
-
70349659108
-
Semantic remote attestation - Virtual machine directed approach to trusted computing
-
USENIX
-
V. Haldar, D. Chandra, and M. Franz, "Semantic Remote Attestation - virtual machine directed approach to trusted computing, " in Virtual Machine Research and Technology Symposium. USENIX, 2004, pp. 29-41.
-
(2004)
Virtual Machine Research and Technology Symposium
, pp. 29-41
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
9
-
-
14844291531
-
Attestationbased policy enforcement for remote access
-
ACM
-
R. Sailer, T. Jaeger, X. Zhang, and L. van Doorn, "Attestationbased policy enforcement for remote access, " in CCS '04. ACM, 2004, pp. 308-317.
-
(2004)
CCS '04
, pp. 308-317
-
-
Sailer, R.1
Jaeger, T.2
Zhang, X.3
Doorn, L.V.4
-
11
-
-
85084162270
-
Design and implementation of a tcg-based integrity measurement architecture
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn, "Design and implementation of a TCG-based integrity measurement architecture, " in USENIX Security Symposium, 2004, pp. 223- 238.
-
(2004)
USENIX Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Doorn, L.V.4
-
12
-
-
41549096799
-
A practical approach for establishing trust relationships between remote platforms using trusted computing
-
ser. LNCS. Springer
-
K. Dietrich, M. Pirker, T. Vejda, R. Toegl, T. Winkler, and P. Lipp, "A practical approach for establishing trust relationships between remote platforms using trusted computing, " in Trustworthy Global Computing, ser. LNCS. Springer, 2007, pp. 156-168.
-
(2007)
Trustworthy Global Computing
, pp. 156-168
-
-
Dietrich, K.1
Pirker, M.2
Vejda, T.3
Toegl, R.4
Winkler, T.5
Lipp, P.6
-
14
-
-
34548722186
-
Minimal tcb code execution
-
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and A. Seshadri, "Minimal TCB code execution, " in IEEE Symposium on Security and Privacy, 2007, pp. 267-272.
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 267-272
-
-
Mccune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Seshadri, A.5
-
15
-
-
58049186715
-
Integrity management infrastructure for trusted computing
-
S. Munetoh, M. Nakamura, S. Yoshihama, and M. Kudo, "Integrity management infrastructure for trusted computing, " IEICE Trans Inf Syst, pp. 1242-1251, 2008.
-
(2008)
IEICE Trans Inf Syst
, pp. 1242-1251
-
-
Munetoh, S.1
Nakamura, M.2
Yoshihama, S.3
Kudo, M.4
-
16
-
-
0003262137
-
The inevitability of failure: The flawed assumption of security in modern computing environments
-
Loscocco et al., "The inevitability of failure: the flawed assumption of security in modern computing environments, " in National Information Systems Security Conference, 1998.
-
(1998)
National Information Systems Security Conference
-
-
Loscocco1
-
18
-
-
70849096059
-
A secure information flow architecture for web service platforms
-
J. Wei, L. Singaravelu, and C. Pu, "A secure information flow architecture for web service platforms, " IEEE Trans. Services Comput., vol. 1, pp. 75-87, 2008.
-
(2008)
IEEE Trans. Services Comput
, vol.1
, pp. 75-87
-
-
Wei, J.1
Singaravelu, L.2
Pu, C.3
-
19
-
-
33646056390
-
CA-in-a-box
-
ser. LNCS. Springer
-
M. Franklin, K. Mitcham, S. Smith, J. Stabiner, and O. Wild, "CA-in-a-Box, " in EuroPKI, ser. LNCS. Springer, 2005, pp. 180-190.
-
(2005)
EuroPKI
, pp. 180-190
-
-
Franklin, M.1
Mitcham, K.2
Smith, S.3
Stabiner, J.4
Wild, O.5
-
20
-
-
33748062337
-
PRIMA: Policy-reduced integrity measurement architecture
-
T. Jaeger, R. Sailer, and U. Shankar, "PRIMA: policy-reduced integrity measurement architecture, " in SACMAT '06, 2006, pp. 19-28.
-
(2006)
SACMAT '06
, pp. 19-28
-
-
Jaeger, T.1
Sailer, R.2
Shankar, U.3
|