-
1
-
-
67549101202
-
Analysis and design of a hardware/software trusted platform module for embedded systems
-
N. Aaraj, A. Raghunathan, and N. K. Jha. Analysis and design of a hardware/software trusted platform module for embedded systems. ACM Trans. Embed. Comput. Syst., 8(1):1-31, 2008.
-
(2008)
ACM Trans. Embed. Comput. Syst.
, vol.8
, Issue.1
, pp. 1-31
-
-
Aaraj, N.1
Raghunathan, A.2
Jha, N.K.3
-
2
-
-
70449472021
-
-
Apache Axis2. http://ws.apache.org/axis2/.
-
Apache Axis2
-
-
-
3
-
-
84910156435
-
VTPM: Virtualizing the trusted platform module
-
S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn. vTPM: virtualizing the trusted platform module. In USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium, 2006.
-
(2006)
USENIX-SS'06: Proceedings of the 15th Conference on USENIX Security Symposium
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
8
-
-
33748062337
-
PRIMA: Policy-Reduced Integrity Measurement Architecture
-
SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
-
T. Jaeger, R. Sailer, and U. Shankar. PRIMA: policy-reduced integrity measurement architecture. In SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies, pages 19-28, 2006. (Pubitemid 44300738)
-
(2006)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, vol.2006
, pp. 19-28
-
-
Jaeger, T.1
Sailer, R.2
Shankar, U.3
-
9
-
-
28144456308
-
An attack on the needham-schroeder public-key authentication protocol
-
G. Lowe. An attack on the needham-schroeder public-key authentication protocol. Inf. Process. Lett., 56(3):131-133, 1995.
-
(1995)
Inf. Process. Lett.
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
13
-
-
85084162270
-
Design and implementation of a tcg-based integrity measurement architecture
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a tcg-based integrity measurement architecture. In SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium, pages 16-16, 2004.
-
(2004)
SSYM'04: Proceedings of the 13th Conference on USENIX Security Symposium
, pp. 16-16
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
14
-
-
30144435491
-
Peer-to-peer access control architecture using trusted computing technology
-
DOI 10.1145/1063979.1064005, SACMAT 2005: Proceedings of 10th ACM Symposium on Access Control Models and Technologies
-
R. Sandhu and X. Zhang. Peer-to-peer access control architecture using trusted computing technology. In SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies, pages 147-158, 2005. (Pubitemid 43087471)
-
(2005)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, pp. 147-158
-
-
Sandhu, R.1
Zhang, X.2
-
15
-
-
51849091963
-
-
Springer
-
V. Scarlata1, C. Rozas, M. Wiseman, D. Grawrock, and C. Vishik. TPM Virtualization: Building a General Framework, pages 43-56. Springer, 2008.
-
(2008)
TPM Virtualization: Building a General Framework
, pp. 43-56
-
-
Scarlata, V.1
Rozas, C.2
Wiseman, M.3
Grawrock, D.4
Vishik, C.5
-
16
-
-
27544477855
-
BIND: A fine-grained attestation service for secure distributed systems
-
Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
-
E. Shi, A. Perrig, and L. V. Doorn. Bind: A fine-grained attestation service for secure distributed systems. In SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pages 154-168, 2005. (Pubitemid 41543653)
-
(2005)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 154-168
-
-
Shi, E.1
Perrig, A.2
Van Doom, L.3
-
21
-
-
79951784102
-
-
Trusted Computing Group. http://www.trustedcomputinggroup.org/.
-
-
-
|