-
3
-
-
34547196300
-
A protocol for property-based attestation
-
ACM, New York
-
Chen, L., Landfermann, R., Löhr, H., Rohe, M., Sadeghi, A.-R., Stüble, C.: A protocol for property-based attestation. In: STC 2006: Proceedings of the First ACMWorkshop on Scalable Trusted Computing, pp. 7-16. ACM, New York (2006)
-
(2006)
STC 2006: Proceedings of the First ACMWorkshop on Scalable Trusted Computing
, pp. 7-16
-
-
Chen, L.1
Landfermann, R.2
Löhr, H.3
Rohe, M.4
Sadeghi, A.-R.5
Stüble, C.6
-
4
-
-
39749167739
-
Enabling Web Services Policy Negotiation with Privacy preserved using XACML
-
IEEE Computer Society, Los Alamitos
-
Cheng, V.S.Y., Hung, P.C.K., Chiu, D.K.W.: Enabling Web Services Policy Negotiation with Privacy preserved using XACML. In: HICSS 2007: Proceedings of the 40th Annual Hawaii International Conference on System Sciences,Washington, DC, USA, p. 33. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
HICSS 2007: Proceedings of the 40th Annual Hawaii International Conference on System Sciences,Washington, DC, USA
, pp. 33
-
-
Cheng, V.S.Y.1
Hung, P.C.K.2
Chiu, D.K.W.3
-
5
-
-
58349113195
-
-
November 2008
-
Deng, F., Luo, A., Zhang, Y., Chen, Z., Peng, X., Jiang, X., Peng, D.: TNC-UTM: A Holistic Solution to Secure Enterprise Networks, November 2008, pp. 2240-2245 (2008)
-
(2008)
TNC-UTM: A Holistic Solution to Secure Enterprise Networks
, pp. 2240-2245
-
-
Deng, F.1
Luo, A.2
Zhang, Y.3
Chen, Z.4
Peng, X.5
Jiang, X.6
Peng, D.7
-
6
-
-
41149100636
-
Poof: No more viruses
-
ACM, New York
-
Fernandez, T., Grinnell, M., Weakland, E.: Poof: no more viruses. In: SIGUCCS 2007: Proceedings of the 35th Annual ACM SIGUCCS Conference on User Services, pp. 96-100. ACM, New York (2007)
-
(2007)
SIGUCCS 2007: Proceedings of the 35th Annual ACM SIGUCCS Conference on User Services
, pp. 96-100
-
-
Fernandez, T.1
Grinnell, M.2
Weakland, E.3
-
7
-
-
77955032400
-
-
June Specification Version 1.0 Revision 1
-
TCG Infrastructure Work Group. Reference Architecture for Interoperability (Part I) (June 2005), http://www.trustedcomputinggroup.org/ resources/infrastructure-work-group-reference-architecture-for- interoperability-specification-part-1-version-10 (Specification Version 1.0 Revision 1)
-
(2005)
Reference Architecture for Interoperability
, Issue.PART I
-
-
-
8
-
-
77955036728
-
-
November Specification Version 1.0 Revision 1
-
TCG Infrastructure Work Group. Reference Architecture Part II - Integrity Management (November 2006), http://www.trustedcomputinggroup.org/ resources/infrastructure-work-group-architecture-part-ii-integrity- management-version-10 (Specification Version 1.0 Revision 1)
-
(2006)
Reference Architecture Part II - Integrity Management
-
-
-
9
-
-
77955032910
-
-
April Specification Version 1.3 Revision 6
-
TCG Trusted Network Connect Work Group. TNC Architecture for Interoperability (April 2008), http://www.trustedcomputinggroup.org/resources/ tnc- architecture-for-interoperability-version-13 (Specification Version 1.3 Revision 6)
-
(2008)
TNC Architecture for Interoperability
-
-
-
10
-
-
77955014939
-
-
February to appear, Specification Version 1.0 Revision 30 Public Review
-
TCG Trusted Network Connect Work Group. TNC IF-M: TLV Binding (February 2008) (to appear), http://www.trustedcomputinggroup.org/developers/ trusted-network-connect (Specification Version 1.0 Revision 30 Public Review)
-
(2008)
TNC IF-M: TLV Binding
-
-
-
11
-
-
36849090141
-
-
October Specification Version 1.2 Level 2 Revision 103
-
TCG Trusted Platform Module Work Group. TPM Main Part 2 TPM Structures (October 2006), http://www.trustedcomputinggroup.org/resources/tpm- specification-version-12-revision-103-part-1-3 (Specification Version 1.2 Level 2 Revision 103)
-
(2006)
TPM Main Part 2 TPM Structures
-
-
-
12
-
-
78650021796
-
-
October Specification Version 1.2 Level 2 Revision 103
-
TCG Trusted Platform Module Work Group. TPM Main Part 3 Commands (October 2006), http://www.trustedcomputinggroup.org/resources/ tpm-specification- version-12-revision-103-part-1-3 (Specification Version 1.2 Level 2 Revision 103)
-
(2006)
TPM Main Part 3 Commands
-
-
-
13
-
-
70749096362
-
-
July Specification Version 1.2 Level 2 Revision 103
-
TCG Trusted Platform Module Work Group. TPM Main Part 1 Design Principles (July 2007), http://www.trustedcomputinggroup.org/resources/tpm- specification-version-12-revision-103-part-1-3 (Specification Version 1.2 Level 2 Revision 103)
-
(2007)
TPM Main Part 1 Design Principles
-
-
-
14
-
-
77955025991
-
-
Trust@FHH Research Group. TNC@FHH Project Page, http://trust.inform.fh- hannover.de/
-
TNC@FHH Project Page
-
-
-
16
-
-
79959566693
-
Realizing property-based attestation and sealing with commonly available hard- and software
-
ACM, New York
-
Kühn, U., Selhorst, M., Stüble, C.: Realizing property-based attestation and sealing with commonly available hard- and software. In: STC 2007: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, pp. 50-57. ACM, New York (2007)
-
(2007)
STC 2007: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing
, pp. 50-57
-
-
Kühn, U.1
Selhorst, M.2
Stüble, C.3
-
17
-
-
33745883651
-
-
February Version 2.0
-
OASIS. eXtensible Access Control Markup Language (XACML) (February 2005), http://docs.oasis-open.org/xacml/2.0/access-control-xacml-2. 0-core-spec-os.pdf (Version 2.0)
-
(2005)
eXtensible Access Control Markup Language (XACML)
-
-
-
18
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
ACM, New York
-
Sadeghi, A.-R., Stüble, C.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: NSPW 2004: Proceedings of the 2004 Workshop on New Security Paradigms, pp. 67-77. ACM, New York (2004)
-
(2004)
NSPW 2004: Proceedings of the 2004 Workshop on New Security Paradigms
, pp. 67-77
-
-
Sadeghi, A.-R.1
Stüble, C.2
-
19
-
-
77955048871
-
Towards real interoperable, real trusted network access control
-
Vieweg + Teubner
-
von Helden, J., Bente, I.: Towards real interoperable, real trusted network access control. In: ISSE 2008 Securing Electronic Business Processes, pp. 152-162. Vieweg + Teubner (2009)
-
(2009)
ISSE 2008 Securing Electronic Business Processes
, pp. 152-162
-
-
Von Helden, J.1
Bente, I.2
-
20
-
-
58349095174
-
-
November 2008
-
Wang, Z., Feng, Q., Xu, R., Dou, Z., Chen, X.: Research on Trusted Access Technology of Grid Resource Based on the Virtual Machine, November 2008, pp. 1384-1388 (2008)
-
(2008)
Research on Trusted Access Technology of Grid Resource Based on the Virtual Machine
, pp. 1384-1388
-
-
Wang, Z.1
Feng, Q.2
Xu, R.3
Dou, Z.4
Chen, X.5
-
21
-
-
58049092343
-
-
October 2008
-
Wang, Z., Feng, Q., Xu, R., Liu, X., Li, X., Qi, N.: Design and Implementation of Wireless Trusted Access Protocol for Embedded Trusted Endpoints, October 2008, pp. 1-5 (2008)
-
(2008)
Design and Implementation of Wireless Trusted Access Protocol for Embedded Trusted Endpoints
, pp. 1-5
-
-
Wang, Z.1
Feng, Q.2
Xu, R.3
Liu, X.4
Li, X.5
Qi, N.6
-
22
-
-
63149133886
-
-
December 2008
-
Wang, Z., Li, X., Yao, L., Feng, Q., Wang, R.: Research on Endpoint Isolation and Remediation Mechanism Based on Trusted Access Technology, December 2008, vol. 2, pp. 89-93 (2008)
-
(2008)
Research on Endpoint Isolation and Remediation Mechanism Based on Trusted Access Technology
, vol.2
, pp. 89-93
-
-
Wang, Z.1
Li, X.2
Yao, L.3
Feng, Q.4
Wang, R.5
|