메뉴 건너뛰기




Volumn , Issue , 2011, Pages 203-212

Enforcing physically restricted access control for remote data

Author keywords

Access control; Applied cryptography; Physically unclonable functions

Indexed keywords

APPLIED CRYPTOGRAPHY; DISTRIBUTED COMPUTING ENVIRONMENT; INTRINSIC PROPERTY; PHYSICALLY UNCLONABLE FUNCTIONS; PROTOTYPE IMPLEMENTATIONS; PUBLIC KEY INFRASTRUCTURE; REMOTE DATA; REMOTE DEVICES; SENSITIVE INFORMATIONS;

EID: 79952807433     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1943513.1943540     Document Type: Conference Paper
Times cited : (6)

References (35)
  • 1
    • 52149089585 scopus 로고    scopus 로고
    • Starbac: Spatiotemporal role based access control
    • S. Aich, S. Sural, and A. K. Majumdar. STARBAC: Spatiotemporal role based access control. In OTM Conferences, 2007.
    • (2007) OTM Conferences
    • Aich, S.1    Sural, S.2    Majumdar, A.K.3
  • 3
    • 74049091912 scopus 로고    scopus 로고
    • Binding software to specific native hardware in a VM environment: The PUF challenge and opportunity
    • ACM
    • M. J. Atallah, E. D. Bryant, J. T. Korb, and J. R. Rice. Binding software to specific native hardware in a VM environment: The PUF challenge and opportunity. In VMSEC'08. ACM, 2008.
    • (2008) VMSEC'08
    • Atallah, M.J.1    Bryant, E.D.2    Korb, J.T.3    Rice, J.R.4
  • 10
  • 12
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Springer-Verlag
    • A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Proceedings on Advances in Cryptology (CRYPTO'86), pages 186-194. Springer-Verlag, 1987.
    • (1987) Proceedings on Advances in Cryptology (CRYPTO'86) , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 19
    • 33747624401 scopus 로고    scopus 로고
    • Combining crypto with biometrics effectively
    • DOI 10.1109/TC.2006.138
    • F. Hao, R. Anderson, and J. Daugman. Combining crypto with biometrics effectively. IEEE Trans. Comput., 55(9):1081-1088, 2006. (Pubitemid 44263808)
    • (2006) IEEE Transactions on Computers , vol.55 , Issue.9 , pp. 1081-1088
    • Hao, F.1    Anderson, R.2    Daugman, J.3
  • 24
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • December
    • R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, December 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 26
    • 78349288790 scopus 로고    scopus 로고
    • M. Riley and I. Richardson. Reed-solomon codes. http://www.cs.cmu.edu/ afs/cs.cmu.edu/project/pscico-guyb/realworld/www/reedsolomon/reed-solomon-codes. html, 1998.
    • (1998) Reed-solomon Codes
    • Riley, M.1    Richardson, I.2
  • 30
    • 56349171224 scopus 로고    scopus 로고
    • Remote attestation on legacy operating systems with trusted platform modules
    • D. Schellekens, B. Wyseur, and B. Preneel. Remote attestation on legacy operating systems with trusted platform modules. In Science of Computer Programming, pages 13-22, 2008.
    • (2008) Science of Computer Programming , pp. 13-22
    • Schellekens, D.1    Wyseur, B.2    Preneel, B.3
  • 31
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • DOI 10.1109/DAC.2007.375043, 4261134, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
    • G. E. Suh and S. Devadas. Physcal unclonable functions for device authentication and secret key generation. In Proceedings of the 44th IEEE Design Automation Conference (DAC), pages 9-14. IEEE Press, 2007. (Pubitemid 47129916)
    • (2007) Proceedings - Design Automation Conference , pp. 9-14
    • Suh, G.E.1    Devadas, S.2
  • 32
    • 23444439038 scopus 로고    scopus 로고
    • AEGIS: A single-chip secure processor
    • DOI 10.1016/j.istr.2005.05.002, PII S1363412705000208
    • G. E. Suh, C. W. O'Donnell, and S. Devadas. AEGIS: A single-chip secure processor. In Elsevier Information Security Technical Report, volume 10, pages 63-73, 2005. (Pubitemid 41108379)
    • (2005) Information Security Technical Report , vol.10 , Issue.2 , pp. 63-73
    • Suh, G.E.1    O'Donnell, C.W.2    Devadas, S.3
  • 33
    • 37149044968 scopus 로고    scopus 로고
    • Aegis: A single-chip secure processor
    • DOI 10.1109/MDT.2007.179
    • G. E. Suh, C. W. O'Donnell, and S. Devadas. Aegis: A single-chip secure processor. IEEE Design and Test of Computers, 24(6):570-580, 2007. (Pubitemid 350253575)
    • (2007) IEEE Design and Test of Computers , vol.24 , Issue.6 , pp. 570-580
    • Suh, G.E.1    ODonnell, C.W.2    Devadas, S.3
  • 34
    • 79952789838 scopus 로고    scopus 로고
    • Trusted computing group
    • October
    • Trusted Computing Group. Trusted Platform Module Main Specification. http://www.trustedcomputinggroup.org/, October 2003.
    • (2003) Trusted Platform Module Main Specification
  • 35


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.