메뉴 건너뛰기




Volumn , Issue , 2009, Pages 30-37

New directions for hardware-assisted trusted computing policies (Position Paper)

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77954696631     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-3-8348-9324-6_3     Document Type: Chapter
Times cited : (3)

References (12)
  • 5
    • 67649963401 scopus 로고    scopus 로고
    • Preventing theft of quality of service on open platforms
    • Computer Science, Hanover, NH, May
    • Kwang-Hyun Baek and Sean W Smith. Preventing theft of quality of service on open platforms. Tech-nical Report TR2005-539, Dartmouth College, Computer Science, Hanover, NH, May 2005.
    • (2005) Tech-nical Report TR2005-539, Dartmouth College
    • Baek, K.-H.1    Smith, S.W.2
  • 10
    • 85013596514 scopus 로고    scopus 로고
    • Concepts of trusted computing
    • Chris Mitchell, editor IET
    • G.J. Proudler. Concepts of Trusted Computing. In Chris Mitchell, editor, Trusted Computing, pages 11-27. IET, 2005.
    • (2005) Trusted Computing , pp. 11-27
    • Proudler, G.J.1
  • 11
    • 27544477855 scopus 로고    scopus 로고
    • BIND: A fine-grained attestation service for se-cure distributed systems
    • Elaine Shi, Adrian Perrig, and Leendert van Doom. BIND: A Fine-Grained Attestation Service for Se-cure Distributed Systems. In IEEE Symposium on Security and Privacy, pages 154-168, 2005.
    • (2005) IEEE Symposium on Security and Privacy , pp. 154-168
    • Shi, E.1    Perrig, A.2    Van Doom, L.3
  • 12
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • Reiner Sailer, Xiaolan Zhang, Trent Jaeger, and Leendert van Doom. Design and Implementation of a TCG-based Integrity Measurement Architecture. In USENIX Security Symposium, pages 223-238, 2004.
    • (2004) USENIX Security Symposium , pp. 223-238
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    Van Doom, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.