-
1
-
-
72849152679
-
-
Trusted Computing Group, TPM Main, Part 1 Design Principles, Version 1.2, Revision 103, July 2007
-
Trusted Computing Group, TPM Main - Part 1 Design Principles, Version 1.2, Revision 103, July 2007.
-
-
-
-
2
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
New York, NY, USA, pp, ACM
-
A.-R. Sadeghi and C. Stüble, "Property-based attestation for computing platforms: Caring about properties, not mechanisms," in NSPW '04: Proceedings of the 2004 Workshop on New Security Paradigms, (New York, NY, USA), pp. 67-77, ACM, 2004.
-
(2004)
NSPW '04: Proceedings of the 2004 Workshop on New Security Paradigms
, pp. 67-77
-
-
Sadeghi, A.-R.1
Stüble, C.2
-
3
-
-
24644439462
-
Property attestation - scalable and privacy-friendly security assessment of peer computers,
-
IBM Research, May
-
J. Poritz, M. Schunter, E. V. Herreweghen, and M. Waidner, "Property attestation - scalable and privacy-friendly security assessment of peer computers," tech. rep., IBM Research, May 2004.
-
(2004)
tech. rep
-
-
Poritz, J.1
Schunter, M.2
Herreweghen, E.V.3
Waidner, M.4
-
4
-
-
50249184705
-
On the applicability of trusted computing in distributed authorization using web services
-
A. Nagarajan, V. Varadharajan, M. Hitchens, and S. Arora, "On the applicability of trusted computing in distributed authorization using web services," in 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, pp. 222-237, 2008.
-
(2008)
22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security
, pp. 222-237
-
-
Nagarajan, A.1
Varadharajan, V.2
Hitchens, M.3
Arora, S.4
-
5
-
-
33749064387
-
WS-Attestation: Efficient and fine-grained remote attestation on web services,
-
IBM Research, February
-
S. Yoshihama, T. Ebringer, M. Nakamura, S. Munetoh, and H. Maruyama, "WS-Attestation: Efficient and fine-grained remote attestation on web services," tech. rep., IBM Research, February 2005.
-
(2005)
tech. rep
-
-
Yoshihama, S.1
Ebringer, T.2
Nakamura, M.3
Munetoh, S.4
Maruyama, H.5
-
6
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
Berkeley, CA, USA, pp, USENIX Association
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn, "Design and implementation of a TCG-based integrity measurement architecture," in SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium, (Berkeley, CA, USA), pp. 16-16, USENIX Association, 2004.
-
(2004)
SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium
, pp. 16-16
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
van Doorn, L.4
-
7
-
-
70349659108
-
Semantic remote attestation: A virtual machine directed approach to trusted computing
-
Berkeley, CA, USA, pp, USENIX Association
-
V. Haldar, D. Chandra, and M. Franz, "Semantic remote attestation: A virtual machine directed approach to trusted computing," in VM'04: Proceedings of the 3rd conference on Virtual Machine Research And Technology Symposium, (Berkeley, CA, USA), pp. 3-3, USENIX Association, 2004.
-
(2004)
VM'04: Proceedings of the 3rd conference on Virtual Machine Research And Technology Symposium
, pp. 3-3
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
8
-
-
33748062337
-
PRIMA: Policy-reduced integrity measurement architecture
-
New York, NY, USA, pp, ACM
-
T. Jaeger, R. Sailer, and U. Shankar, "PRIMA: Policy-reduced integrity measurement architecture," in SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies, (New York, NY, USA), pp. 19-28, ACM, 2006.
-
(2006)
SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies
, pp. 19-28
-
-
Jaeger, T.1
Sailer, R.2
Shankar, U.3
-
9
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
D. D. Clark and D. R. Wilson, "A comparison of commercial and military computer security policies," Security and Privacy, IEEE Symposium on, vol. 0, p. 184, 1987.
-
(1987)
Security and Privacy, IEEE Symposium on
, vol.0
, pp. 184
-
-
Clark, D.D.1
Wilson, D.R.2
-
10
-
-
72849144664
-
-
U. Shankar, Toward automated information-flow integrity verification for security-critical applications, in In Proceedings of the 2006 ISOC Networked and Distributed Systems Security Symposium NDSS'06, 2006.
-
U. Shankar, "Toward automated information-flow integrity verification for security-critical applications," in In Proceedings of the 2006 ISOC Networked and Distributed Systems Security Symposium (NDSS'06, 2006.
-
-
-
-
11
-
-
40449098197
-
An efficient attestation for trustworthiness of computing platform
-
Washington, DC, USA, pp, IEEE Computer Society
-
X.-Y. Li, C.-X. Shen, and X.-D. Zuo, "An efficient attestation for trustworthiness of computing platform," in IIH-MSP '06: Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia, (Washington, DC, USA), pp. 625-630, IEEE Computer Society, 2006.
-
(2006)
IIH-MSP '06: Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia
, pp. 625-630
-
-
Li, X.-Y.1
Shen, C.-X.2
Zuo, X.-D.3
-
12
-
-
57349085064
-
Model-based behavioral attestation
-
New York, NY, USA, pp, ACM
-
M. Alam, X. Zhang, M. Nauman, T. Ali, and J.-P. Seifert, "Model-based behavioral attestation," in SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies, (New York, NY, USA), pp. 175-184, ACM, 2008.
-
(2008)
SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies
, pp. 175-184
-
-
Alam, M.1
Zhang, X.2
Nauman, M.3
Ali, T.4
Seifert, J.-P.5
-
13
-
-
0242456750
-
Towards usage control models: Beyond traditional access control
-
New York, NY, USA, pp, ACM
-
J. Park and R. Sandhu, "Towards usage control models: Beyond traditional access control," in SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies, (New York, NY, USA), pp. 57-64, ACM, 2002.
-
(2002)
SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies
, pp. 57-64
-
-
Park, J.1
Sandhu, R.2
-
15
-
-
0021177508
-
Unwinding and inference control
-
IEE Computer Society, May
-
J. A. Goguen and J. Meseguer, "Unwinding and inference control," in Symposium on Security and Privacy, pp. 75-86, IEE Computer Society, May 1984.
-
(1984)
Symposium on Security and Privacy
, pp. 75-86
-
-
Goguen, J.A.1
Meseguer, J.2
-
17
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
Washington, DC, USA, p, IEEE Computer Society
-
J. McLean, "A general theory of composition for trace sets closed under selective interleaving functions," in SP '94: Proceedings of the 1994 IEEE Symposium on Security and Privacy, (Washington, DC, USA), p. 79, IEEE Computer Society, 1994.
-
(1994)
SP '94: Proceedings of the 1994 IEEE Symposium on Security and Privacy
, pp. 79
-
-
McLean, J.1
|