-
4
-
-
34547277604
-
Survey of information Security
-
Shen C, Zhang H, Feng D, et al. Survey of information Security. Sci China Ser F-Inf Sci, 2007, 50: 273-298.
-
(2007)
Sci China Ser F-Inf Sci
, vol.50
, pp. 273-298
-
-
Shen, C.1
Zhang, H.2
Feng, D.3
-
5
-
-
46449126152
-
Development of trusted computing research
-
Zhang H, Luo J, Jin G, et al. Development of trusted computing research (in Chinese). J Wuhan Univ (Nat Sci Ed), 2006, 52: 513-518.
-
(2006)
J Wuhan Univ (Nat Sci Ed)
, vol.52
, pp. 513-518
-
-
Zhang, H.1
Luo, J.2
Jin, G.3
-
7
-
-
65349130418
-
Ten years' exploration for test, evaluation and certification of information security
-
Wu S. Ten years' exploration for test, evaluation and certification of information security (in Chinese). Inf Secur Comm Priv, 2007, 6: 5-8.
-
(2007)
Inf Secur Comm Priv
, vol.6
, pp. 5-8
-
-
Wu, S.1
-
8
-
-
71949106152
-
Automated testing of the trusted platform module
-
Zhan J, Zhang H. Automated testing of the trusted platform module (in Chinese). J Comp Res Develop, 2009, 48: 1839-1846.
-
(2009)
J Comp Res Develop
, vol.48
, pp. 1839-1846
-
-
Zhan, J.1
Zhang, H.2
-
10
-
-
65349097321
-
Research on compliant testing method of trusted cryptography module
-
Li H, Hu H, Chen X. Research on compliant testing method of trusted cryptography module (in Chinese). J Comput, 2009, 32: 654-663.
-
(2009)
J Comput
, vol.32
, pp. 654-663
-
-
Li, H.1
Hu, H.2
Chen, X.3
-
11
-
-
77952302665
-
An approach for compliance validation of TPM through applications
-
Cui Q, Shi W. An approach for compliance validation of TPM through applications. J Graduate School Chinese Acad Sci. 2008, 25: 649-656.
-
(2008)
J Graduate School Chinese Acad Sci.
, vol.25
, pp. 649-656
-
-
Cui, Q.1
Shi, W.2
-
12
-
-
70449640065
-
A logic of secure systems and its application to trusted computing
-
C. S. Pandey (Ed.), Oakland: IEEE Computer Society Press
-
Anupam D, Jason F, Deepak G, et al. A logic of secure systems and its application to trusted computing. In: Pandey C S, ed. 30th IEEE Symposium on Security & Privacy. Oakland: IEEE Computer Society Press, 2009. 221-236.
-
(2009)
30th IEEE Symposium on Security & Privacy
, pp. 221-236
-
-
Anupam, D.1
Jason, F.2
Deepak, G.3
-
13
-
-
65349106488
-
Testing on trust chain of trusted computing platform based on labeled transition system
-
Xu M, Zhang H, Yan F. Testing on trust chain of trusted computing platform based on labeled transition system (in Chinese). J Comput, 2009, 32: 635-645.
-
(2009)
J Comput
, vol.32
, pp. 635-645
-
-
Xu, M.1
Zhang, H.2
Yan, F.3
-
14
-
-
34547208096
-
TCG inside?-a note on TPM specification compliance
-
C. Mitchell (Ed.), New York: Association for Computing Machinery
-
Sadeghi A, Selhorst M, Stueble C, et al. TCG inside?-a note on TPM specification compliance. In: Mitchell C, ed. The First ACM Workshop on Scalable Trusted Computing. New York: Association for Computing Machinery, 2006. 47-56.
-
(2006)
The First ACM Workshop on Scalable Trusted Computing
, pp. 47-56
-
-
Sadeghi, A.1
Selhorst, M.2
Stueble, C.3
-
15
-
-
37149032670
-
Automated analysis of security APIs
-
Cambridge: Massachusetts Institute of Technology
-
Lin A H. Automated analysis of security APIs. Master Thesis. Cambridge: Massachusetts Institute of Technology, 2005.
-
(2005)
Master Thesis
-
-
Lin, A.H.1
-
16
-
-
38049069294
-
Security evaluation of scenarios based on the TCG's TPM specification
-
J. Biskup and J. Lopez (Eds.), Dresden: Springer
-
Gurgens S, Rudolph C, Scheuermann D, et al. Security evaluation of scenarios based on the TCG's TPM specification. In: Biskup J, Lopez J, eds. Proceedings of 12th European Symposium on Research In Computer Security. Dresden: Springer, 2007. 438-453.
-
(2007)
Proceedings of 12th European Symposium on Research In Computer Security
, pp. 438-453
-
-
Gurgens, S.1
Rudolph, C.2
Scheuermann, D.3
-
17
-
-
77952309839
-
Research on cryptology mechanism of trusted computing platform module
-
Luo J, Yan F, Yu F, et al. Research on cryptology mechanism of trusted computing platform module (in Chinese). J Comput Appl, 2008, 28: 1907-1915.
-
(2008)
J Comput Appl
, vol.28
, pp. 1907-1915
-
-
Luo, J.1
Yan, F.2
Yu, F.3
-
18
-
-
65349160852
-
The formal analysis and testing of trusted platform module
-
Chen X. The formal analysis and testing of trusted platform module (in Chinese). J Comput, 2009, 32: 646-653.
-
(2009)
J Comput
, vol.32
, pp. 646-653
-
-
Chen, X.1
-
19
-
-
77952317753
-
Compliant testing method of trusted cryptography module
-
Li H, Feng D. Compliant testing method of trusted cryptography module (in Chinese). J Wuhan Univ (Nat Sci Ed), 2009, 55: 31-34.
-
(2009)
J Wuhan Univ (Nat Sci Ed)
, vol.55
, pp. 31-34
-
-
Li, H.1
Feng, D.2
-
20
-
-
65249105368
-
Case study: Automated security testing on the trusted computing platform
-
C. Mitchell (Ed.), New York: Association for Computing Machinery
-
Gergely T, Koszegi G, Hornák Z. Case study: automated security testing on the trusted computing platform. In: Mitchell C, ed. Proceedings of the 1st ACM SIGOPS European Workshop on System Security, New York: Association for Computing Machinery, 2008. 35-39.
-
(2008)
Proceedings of the 1st ACM SIGOPS European Workshop on System Security
, pp. 35-39
-
-
Gergely, T.1
Koszegi, G.2
Hornák, Z.3
-
22
-
-
38049064378
-
Formal analysis of secure bootstrap in trusted computing
-
B. Xiao, L. T. Yang, and J. H. Ma (Eds.), Berlin: Springer
-
Chen S, Wen Y, Wen H. Formal analysis of secure bootstrap in trusted computing. In: Xiao B, Yang L T, Ma J H, eds. Proceedings of 4th International Conference on Autonomic and Trusted Computing. Berlin: Springer, 2007. 352-360.
-
(2007)
Proceedings of 4th International Conference on Autonomic and Trusted Computing
, pp. 352-360
-
-
Chen, S.1
Wen, Y.2
Wen, H.3
-
24
-
-
84988393004
-
Classification of security properties (Part I: Information flow)
-
R. Focardi and R. Gorrieri (Eds.), Franconia: Springer-Verlag
-
Focardi R, Gorrieri R. Classification of security properties (Part I: information flow). In: Focardi R, Gorrieri R, eds. Foundations of Security Analysis and Design-Tutorial Lectures, LNCS, Vo1. 2171. Franconia: Springer-Verlag, 2001. 331-396.
-
(2001)
Foundations of Security Analysis and Design-Tutorial Lectures, LNCS
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
25
-
-
77952301475
-
Non-interference models in computer security
-
Zhou W, Yin Q, Guo J. Non-interference models in computer security (in Chinese). Comput Sci, 2005, 32: 159-165.
-
(2005)
Comput Sci
, vol.32
, pp. 159-165
-
-
Zhou, W.1
Yin, Q.2
Guo, J.3
-
27
-
-
27544477855
-
BIND: A fine-grained attestation service for secure distributed systems
-
C. S. Pandey (Ed.), Oakland: IEEE Computer Society Press
-
Shi E, Perrig A, Doorn L V. BIND: A fine-grained attestation service for secure distributed systems. In: Pandey C S, ed. 24th IEEE Symposium on Security and Privacy. Oakland: IEEE Computer Society Press, 2005. 154-168.
-
(2005)
24th IEEE Symposium on Security and Privacy
, pp. 154-168
-
-
Shi, E.1
Perrig, A.2
Doorn, L.V.3
-
30
-
-
24644460616
-
CoPS-checker of persistent security
-
K. Jensen and A. Podelski (Eds.), Berlin: Springer-Verlag
-
Piazza C, Pivato E, Rossi S. CoPS-checker of persistent security. In: Jensen K, Podelski A, eds. Tools and Algorithms for the Construction and Analysis of Systems, 10th Int. Conf., TACAS'04. LNCS, Vol. 2988. Berlin: Springer-Verlag, 2004. 144-152.
-
(2004)
Tools and Algorithms for the Construction and Analysis of Systems, 10th Int. Conf., TACAS'04. LNCS
, pp. 144-152
-
-
Piazza, C.1
Pivato, E.2
Rossi, S.3
-
32
-
-
77953987366
-
Random testing: From the classical approach to a global view and full test automation
-
E. Wong (Ed.), New York: Association for Computing Machinery
-
Rainer G, Ralf G, Thomas B. Random testing: from the classical approach to a global view and full test automation. In: Wong E, ed. Proceedings of the Second International Workshop on Random Testing. New York: Association for Computing Machinery, 2007. 30-37.
-
(2007)
Proceedings of the Second International Workshop on Random Testing
, pp. 30-37
-
-
Rainer, G.1
Ralf, G.2
Thomas, B.3
-
35
-
-
4444334164
-
JCrasher: An automatic robustness tester for Java
-
Csallner C, Smaragdakis Y. JCrasher: an automatic robustness tester for Java. Softw: Pract Exp, 2004, 34: 1025-1050.
-
(2004)
Softw: Pract Exp
, vol.34
, pp. 1025-1050
-
-
Csallner, C.1
Smaragdakis, Y.2
-
39
-
-
34250346420
-
Daonity: Grid security with behaviour conformity from trusted computing
-
C. Mitchell (Ed.), New York: Association for Computing Machinery
-
Mao W, Yan F, Chen C. Daonity: grid security with behaviour conformity from trusted computing. In: Mitchell C, eds. The First ACM Workshop on Scalable Trusted Computing. New York: Association for Computing Machinery, 2006. 43-46.
-
(2006)
The First ACM Workshop on Scalable Trusted Computing
, pp. 43-46
-
-
Mao, W.1
Yan, F.2
Chen, C.3
|