메뉴 건너뛰기




Volumn 22, Issue 2, 2011, Pages 339-352

Efficient remote attestation mechanism with privacy protection

Author keywords

Merkle hash tree; Privacy protection; Remote attestation; Trusted computing; Verification efficiency

Indexed keywords

HIGH EFFICIENCY; INTEGRITY MEASUREMENT; MERKLE HASH TREE; NEW MECHANISMS; PRIVACY PROTECTION; PSEUDO-CODE; REMOTE ATTESTATION; TARGET APPLICATION; TRUSTED COMPUTING; TRUSTED PLATFORM MODULE;

EID: 79953070593     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: 10.3724/SP.J.1001.2011.03714     Document Type: Article
Times cited : (18)

References (26)
  • 1
    • 21644486314 scopus 로고    scopus 로고
    • TCG specification architecture overview revision 1.4
    • Trusted Computing Group. TCG specification architecture overview revision 1.4. 2007. http://www.trustedcomputinggroup.org/
    • (2007)
  • 2
    • 79953120821 scopus 로고    scopus 로고
    • TPM main specification version 1.2 revision 103 part 1 & 2 & 3
    • Trusted Computing Group. TPM main specification version 1.2 revision 103 part 1 & 2 & 3. 2007. http://www.trustedcomputinggroup.org/
    • (2007)
  • 3
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • Berkley: USENIX Association
    • Sailer R, Zhang XL, Jaeger T, van Doorn L. Design and implementation of a TCG-based integrity measurement architecture. In: Proc. of the 13th USENIX Security Symp. Berkley: USENIX Association, 2004. 223-238.
    • (2004) Proc. of the 13th USENIX Security Symp. , pp. 223-238
    • Sailer, R.1    Zhang, X.L.2    Jaeger, T.3    van Doorn, L.4
  • 5
    • 84920380941 scopus 로고
    • Protocols for public key cryptosystems
    • Washington: IEEE Computer Society
    • Merkle RC. Protocols for public key cryptosystems. In: Proc. of the IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society, 1980. 122-134.
    • (1980) Proc. of the IEEE Symp. on Security and Privacy , pp. 122-134
    • Merkle, R.C.1
  • 6
    • 84969346266 scopus 로고
    • A certified digital signature
    • Brassard G, ed. Heidelberg: Springer-Verlag. [doi: 10.1007/0-387-34805-0_21]
    • Merkle RC. A certified digital signature. In: Brassard G, ed. Proc. of the 9th Annual Int'l Cryptology Conf. on Advances in Cryptology. Heidelberg: Springer-Verlag, 1989. 218-238. [doi: 10.1007/0-387-34805-0_21]
    • (1989) Proc. of the 9th Annual Int'l Cryptology Conf. on Advances in Cryptology , pp. 218-238
    • Merkle, R.C.1
  • 7
    • 29244450159 scopus 로고    scopus 로고
    • Property-Based attestation for computing platforms: caring about properties, not mechanisms
    • Raskin V, ed. New York: ACM. [doi: 10.1145/1065907.1066038]
    • Sadeghi A, Stüble C. Property-Based attestation for computing platforms: caring about properties, not mechanisms. In: Raskin V, ed. Proc. of the 2004 Workshop on New Security Paradigms. New York: ACM, 2004. 67-77. [doi: 10.1145/1065907.1066038]
    • (2004) Proc. of the 2004 Workshop on New Security Paradigms , pp. 67-77
    • Sadeghi, A.1    Stüble, C.2
  • 11
    • 27544477855 scopus 로고    scopus 로고
    • BIND: A fine-grained attestation service for secure distributed systems
    • Washington: IEEE Computer Society. [doi: 10.1109/SP.2005.4]
    • Shi E, Perrig A, Van Doorn L. BIND: A fine-grained attestation service for secure distributed systems. In: Proc. of the IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society, 2005. 154-168. [doi: 10.1109/SP.2005.4]
    • (2005) Proc. of the IEEE Symp. on Security and Privacy , pp. 154-168
    • Shi, E.1    Perrig, A.2    Van Doorn, L.3
  • 12
    • 84885617227 scopus 로고    scopus 로고
    • Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
    • Herbert A, ed. New York: ACM. [doi: 10.1145/1095810.1095812]
    • Seshadri A, Luk M, Shi E, Perrig A, van Doorn L, Khosla P. Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems. In: Herbert A, ed. Proc. of the ACM Symp. on Operating Systems Principles. New York: ACM, 2005. 1-16. [doi: 10.1145/1095810.1095812]
    • (2005) Proc. of the ACM Symp. on Operating Systems Principles , pp. 1-16
    • Seshadri, A.1    Luk, M.2    Shi, E.3    Perrig, A.4    van Doorn, L.5    Khosla, P.6
  • 13
    • 3042738543 scopus 로고    scopus 로고
    • SWATT: Software-Based Attestation for embedded devices
    • Washington: IEEE Computer Society. [doi: 10.1109/SECPRI.2004.1301329]
    • Seshadri A, Perrig A, van Doorn L, Khosla P. SWATT: Software-Based Attestation for embedded devices. In: Proc. of the IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society, 2004. 272-282. [doi: 10.1109/SECPRI.2004.1301329]
    • (2004) Proc. of the IEEE Symp. on Security and Privacy , pp. 272-282
    • Seshadri, A.1    Perrig, A.2    van Doorn, L.3    Khosla, P.4
  • 14
    • 70349659108 scopus 로고    scopus 로고
    • Semantic remote attestation - A virtual machine directed approach to trusted computing
    • Berkley: USENIX Association
    • Haldar V, Chandra D, Franz M. Semantic remote attestation - A virtual machine directed approach to trusted computing. In: Proc. of the 3rd Virtual Machine Research & Technology Symp. Berkley: USENIX Association, 2004. 29-41.
    • (2004) Proc. of the 3rd Virtual Machine Research & Technology Symp. , pp. 29-41
    • Haldar, V.1    Chandra, D.2    Franz, M.3
  • 17
    • 30144435491 scopus 로고    scopus 로고
    • Peer-to-Peer access control architecture using trusted computing technology
    • Ferrari E, ed. New York: ACM. [doi: 10.1145/1063979. 1064005]
    • Sandhu R, Zhang XW. Peer-to-Peer access control architecture using trusted computing technology. In: Ferrari E, ed. Proc. of the 10th ACM Symp. on Access Control Models and Technologies. New York: ACM, 2005. 147-158. [doi: 10.1145/1063979. 1064005]
    • (2005) Proc. of the 10th ACM Symp. on Access Control Models and Technologies , pp. 147-158
    • Sandhu, R.1    Zhang, X.W.2
  • 23
  • 26
    • 18844367451 scopus 로고    scopus 로고
    • Optimal parameter selection for efficient memory integrity verification using Merkle hash trees
    • Washington: IEEE Computer Society. [doi: 10.1109/NCA.2004.1347805]
    • Williams D, Sirer EG. Optimal parameter selection for efficient memory integrity verification using Merkle hash trees. In: Proc. of the 3rd IEEE Int'l Symp. on Network Computing and Applications. Washington: IEEE Computer Society, 2004. 383-388. [doi: 10.1109/NCA.2004.1347805]
    • (2004) Proc. of the 3rd IEEE Int'l Symp. on Network Computing and Applications , pp. 383-388
    • Williams, D.1    Sirer, E.G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.