메뉴 건너뛰기




Volumn 6101 LNCS, Issue , 2010, Pages 95-108

Application of trusted computing in automation to prevent product piracy

Author keywords

Automation; Mechanical Engineering; Product Piracy; Trusted Computing; Trusted Platform Module (TPM)

Indexed keywords

MACHINE FUNCTIONALITY; ONE-MACHINE; PRODUCT PIRACY; PROTECTION MEASURES; TRUSTED COMPUTING; TRUSTED PLATFORM MODULE; TRUSTED PLATFORM MODULE (TPM);

EID: 77954750364     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13869-0_7     Document Type: Conference Paper
Times cited : (2)

References (19)
  • 1
    • 41549096799 scopus 로고    scopus 로고
    • A practical approach for establishing trust relationships between remote platforms using trusted computing
    • Barthe, G., Fournet, C. (eds.) TGC 2007 and FODO 2008. Springer, Heidelberg
    • Dietrich, K., Pirker, M., Vejda, T., Toegl, R., Winkler, T., Lipp, P.: A practical approach for establishing trust relationships between remote platforms using trusted computing. In: Barthe, G., Fournet, C. (eds.) TGC 2007 and FODO 2008. LNCS, vol. 4912, pp. 156-168. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4912 , pp. 156-168
    • Dietrich, K.1    Pirker, M.2    Vejda, T.3    Toegl, R.4    Winkler, T.5    Lipp, P.6
  • 2
    • 70350686777 scopus 로고    scopus 로고
    • Implementation aspects of mobile and embedded trusted computing
    • Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. Springer, Heidelberg
    • Dietrich, K., Winter, J.: Implementation aspects of mobile and embedded trusted computing. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol. 5471, pp. 29-44. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5471 , pp. 29-44
    • Dietrich, K.1    Winter, J.2
  • 4
    • 77954716842 scopus 로고    scopus 로고
    • Trusted Computing Group: TCG Glossary, http://www.trustedcomputinggroup. org/developers/glossary
    • TCG Glossary
  • 6
    • 77954691659 scopus 로고    scopus 로고
    • The Right to Informational Self-Determination and the Value of Self-Development: Reassessing the Importance of Privacy for Democracy
    • Gutwirth, S., Poullet, Y., de Hert, P., de Terwangne, C., Nouwt, S. (eds.) Springer, Netherlands
    • Rouvroy, A., Poullet, Y.: The Right to Informational Self-Determination and the Value of Self-Development: Reassessing the Importance of Privacy for Democracy. In: Gutwirth, S., Poullet, Y., de Hert, P., de Terwangne, C., Nouwt, S. (eds.) Reinventing Data Protection? pp. 45-76. Springer, Netherlands (2009)
    • (2009) Reinventing Data Protection? , pp. 45-76
    • Rouvroy, A.1    Poullet, Y.2
  • 9
    • 77954730046 scopus 로고    scopus 로고
    • Security Innovation: Core TCG Software Stack (CTSS), http://www. securityinnovation.com/pdf/collateral/trusted-software-stack.pdf
    • Core TCG Software Stack (CTSS)
  • 10
    • 77954699670 scopus 로고    scopus 로고
    • Microsoft Developer Network: TPM Base Services, http://msdn.microsoft. com/en-us/library/aa446796%28VS.85%29.aspx
    • TPM Base Services
  • 11
    • 38149004799 scopus 로고    scopus 로고
    • BIOS Security Analysis and a Kind of Trusted BIOS
    • Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. Springer, Heidelberg
    • Zhou, Z., Xu, R.: BIOS Security Analysis and a Kind of Trusted BIOS. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 427-437. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4861 , pp. 427-437
    • Zhou, Z.1    Xu, R.2
  • 12
    • 77954707162 scopus 로고    scopus 로고
    • Phoenix Technologies: Phoenix SecureCore, http://www.phoenix.com/ptec/ docs/securecore-ds-en.pdf
    • Phoenix SecureCore
  • 14
    • 77954715320 scopus 로고    scopus 로고
    • Version 1.2 Level 2 Revision 103
    • Trusted Computing Group TPM Working Group: TPM Main Part 3 Commands Specification Version 1.2 Level 2 Revision 103, http://www. trustedcomputinggroup.org/files/static-page-files/ACD28F6C-1D09-3519- AD210DC2597F1E4C/mainP3Commandsrev103.pdf
    • TPM Main Part 3 Commands Specification
  • 15
    • 77954691875 scopus 로고    scopus 로고
    • Specification for the Advanced Encryption Standard (AES)
    • FIPS
    • FIPS: Specification for the Advanced Encryption Standard (AES), In: Federal Information Processing Standards Publication 197, http://csrc.nist.gov/ publications/fips/fips197/fips-197.pdf
    • Federal Information Processing Standards Publication 197
  • 18
    • 84893560866 scopus 로고    scopus 로고
    • Trusted Computing Group: TCG Specification Architecture Overview http://www.trustedcomputinggroup.org/files/resource-files/AC652DE1-1D09-3519- ADA026A0C05CFAC2/TCG-1-4-Architecture-Overview.pdf
    • TCG Specification Architecture Overview


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.