메뉴 건너뛰기




Volumn , Issue , 2009, Pages 278-285

Property based attestation and trusted computing: Analysis and challenges

Author keywords

[No Author keywords available]

Indexed keywords

BINARY VALUES; DISTRIBUTED SYSTEMS; LOW LEVEL; PROPERTY-BASED ATTESTATION; REAL-WORLD SYSTEM; SECURITY PROPERTIES; TRUSTED COMPUTING;

EID: 72849116409     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NSS.2009.83     Document Type: Conference Paper
Times cited : (28)

References (17)
  • 1
    • 72849152679 scopus 로고    scopus 로고
    • Trusted Computing Group, TPM Main, Part 1 Design Principles, Version 1.2, Revision 103, July 2007
    • Trusted Computing Group, TPM Main - Part 1 Design Principles, Version 1.2, Revision 103, July 2007.
  • 2
    • 29244450159 scopus 로고    scopus 로고
    • Property-based attestation for computing platforms: Caring about properties, not mechanisms
    • New York, NY, USA, pp, ACM
    • A.-R. Sadeghi and C. Stüble, "Property-based attestation for computing platforms: Caring about properties, not mechanisms," in NSPW '04: Proceedings of the 2004 Workshop on New Security Paradigms, (New York, NY, USA), pp. 67-77, ACM, 2004.
    • (2004) NSPW '04: Proceedings of the 2004 Workshop on New Security Paradigms , pp. 67-77
    • Sadeghi, A.-R.1    Stüble, C.2
  • 3
    • 24644439462 scopus 로고    scopus 로고
    • Property attestation - scalable and privacy-friendly security assessment of peer computers,
    • IBM Research, May
    • J. Poritz, M. Schunter, E. V. Herreweghen, and M. Waidner, "Property attestation - scalable and privacy-friendly security assessment of peer computers," tech. rep., IBM Research, May 2004.
    • (2004) tech. rep
    • Poritz, J.1    Schunter, M.2    Herreweghen, E.V.3    Waidner, M.4
  • 5
    • 33749064387 scopus 로고    scopus 로고
    • WS-Attestation: Efficient and fine-grained remote attestation on web services,
    • IBM Research, February
    • S. Yoshihama, T. Ebringer, M. Nakamura, S. Munetoh, and H. Maruyama, "WS-Attestation: Efficient and fine-grained remote attestation on web services," tech. rep., IBM Research, February 2005.
    • (2005) tech. rep
    • Yoshihama, S.1    Ebringer, T.2    Nakamura, M.3    Munetoh, S.4    Maruyama, H.5
  • 9
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • D. D. Clark and D. R. Wilson, "A comparison of commercial and military computer security policies," Security and Privacy, IEEE Symposium on, vol. 0, p. 184, 1987.
    • (1987) Security and Privacy, IEEE Symposium on , vol.0 , pp. 184
    • Clark, D.D.1    Wilson, D.R.2
  • 10
    • 72849144664 scopus 로고    scopus 로고
    • U. Shankar, Toward automated information-flow integrity verification for security-critical applications, in In Proceedings of the 2006 ISOC Networked and Distributed Systems Security Symposium NDSS'06, 2006.
    • U. Shankar, "Toward automated information-flow integrity verification for security-critical applications," in In Proceedings of the 2006 ISOC Networked and Distributed Systems Security Symposium (NDSS'06, 2006.
  • 15
    • 0021177508 scopus 로고
    • Unwinding and inference control
    • IEE Computer Society, May
    • J. A. Goguen and J. Meseguer, "Unwinding and inference control," in Symposium on Security and Privacy, pp. 75-86, IEE Computer Society, May 1984.
    • (1984) Symposium on Security and Privacy , pp. 75-86
    • Goguen, J.A.1    Meseguer, J.2
  • 17
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • Washington, DC, USA, p, IEEE Computer Society
    • J. McLean, "A general theory of composition for trace sets closed under selective interleaving functions," in SP '94: Proceedings of the 1994 IEEE Symposium on Security and Privacy, (Washington, DC, USA), p. 79, IEEE Computer Society, 1994.
    • (1994) SP '94: Proceedings of the 1994 IEEE Symposium on Security and Privacy , pp. 79
    • McLean, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.