-
1
-
-
21644486314
-
TCG specification architecture overview revision 1.4
-
Trusted Computing Group. TCG specification architecture overview revision 1.4. 2007. http://www.trustedcomputinggroup.org/
-
(2007)
-
-
-
2
-
-
79953120821
-
TPM main specification version 1.2 revision 103 part 1 & 2 & 3
-
Trusted Computing Group. TPM main specification version 1.2 revision 103 part 1 & 2 & 3. 2007. http://www.trustedcomputinggroup.org/
-
(2007)
-
-
-
3
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
Berkley: USENIX Association
-
Sailer R, Zhang XL, Jaeger T, van Doorn L. Design and implementation of a TCG-based integrity measurement architecture. In: Proc. of the 13th USENIX Security Symp. Berkley: USENIX Association, 2004. 223-238.
-
(2004)
Proc. of the 13th USENIX Security Symp.
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.L.2
Jaeger, T.3
van Doorn, L.4
-
4
-
-
33748062337
-
PRIMA: Policy-Reduced integrity measurement architecture
-
Ferraiolo D, et al., eds. New York: ACM
-
Jaeger T, Sailer R, Shankar U. PRIMA: Policy-Reduced integrity measurement architecture. In: Ferraiolo D, et al., eds. Proc. of the 11th ACM Symp. on Access Control Models and Technologies. New York: ACM, 2006. 19-28.
-
(2006)
Proc. of the 11th ACM Symp. on Access Control Models and Technologies
, pp. 19-28
-
-
Jaeger, T.1
Sailer, R.2
Shankar, U.3
-
5
-
-
84920380941
-
Protocols for public key cryptosystems
-
Washington: IEEE Computer Society
-
Merkle RC. Protocols for public key cryptosystems. In: Proc. of the IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society, 1980. 122-134.
-
(1980)
Proc. of the IEEE Symp. on Security and Privacy
, pp. 122-134
-
-
Merkle, R.C.1
-
6
-
-
84969346266
-
A certified digital signature
-
Brassard G, ed. Heidelberg: Springer-Verlag. [doi: 10.1007/0-387-34805-0_21]
-
Merkle RC. A certified digital signature. In: Brassard G, ed. Proc. of the 9th Annual Int'l Cryptology Conf. on Advances in Cryptology. Heidelberg: Springer-Verlag, 1989. 218-238. [doi: 10.1007/0-387-34805-0_21]
-
(1989)
Proc. of the 9th Annual Int'l Cryptology Conf. on Advances in Cryptology
, pp. 218-238
-
-
Merkle, R.C.1
-
7
-
-
29244450159
-
Property-Based attestation for computing platforms: caring about properties, not mechanisms
-
Raskin V, ed. New York: ACM. [doi: 10.1145/1065907.1066038]
-
Sadeghi A, Stüble C. Property-Based attestation for computing platforms: caring about properties, not mechanisms. In: Raskin V, ed. Proc. of the 2004 Workshop on New Security Paradigms. New York: ACM, 2004. 67-77. [doi: 10.1145/1065907.1066038]
-
(2004)
Proc. of the 2004 Workshop on New Security Paradigms
, pp. 67-77
-
-
Sadeghi, A.1
Stüble, C.2
-
9
-
-
14844291531
-
Attestation-Based policy enforcement for remote access
-
Aturi V, et al., eds. New York: ACM. [doi: 10.1145/1030083. 1030125]
-
Sailer R, Jaeger T, Zhang XL, van Doorn L. Attestation-Based policy enforcement for remote access. In: Aturi V, et al., eds. Proc. of the 11th ACM Conf. on Computer and Communications Security. New York: ACM, 2004. 308-317. [doi: 10.1145/1030083. 1030125]
-
(2004)
Proc. of the 11th ACM Conf. on Computer and Communications Security
, pp. 308-317
-
-
Sailer, R.1
Jaeger, T.2
Zhang, X.L.3
van Doorn, L.4
-
11
-
-
27544477855
-
BIND: A fine-grained attestation service for secure distributed systems
-
Washington: IEEE Computer Society. [doi: 10.1109/SP.2005.4]
-
Shi E, Perrig A, Van Doorn L. BIND: A fine-grained attestation service for secure distributed systems. In: Proc. of the IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society, 2005. 154-168. [doi: 10.1109/SP.2005.4]
-
(2005)
Proc. of the IEEE Symp. on Security and Privacy
, pp. 154-168
-
-
Shi, E.1
Perrig, A.2
Van Doorn, L.3
-
12
-
-
84885617227
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
Herbert A, ed. New York: ACM. [doi: 10.1145/1095810.1095812]
-
Seshadri A, Luk M, Shi E, Perrig A, van Doorn L, Khosla P. Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems. In: Herbert A, ed. Proc. of the ACM Symp. on Operating Systems Principles. New York: ACM, 2005. 1-16. [doi: 10.1145/1095810.1095812]
-
(2005)
Proc. of the ACM Symp. on Operating Systems Principles
, pp. 1-16
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
van Doorn, L.5
Khosla, P.6
-
13
-
-
3042738543
-
SWATT: Software-Based Attestation for embedded devices
-
Washington: IEEE Computer Society. [doi: 10.1109/SECPRI.2004.1301329]
-
Seshadri A, Perrig A, van Doorn L, Khosla P. SWATT: Software-Based Attestation for embedded devices. In: Proc. of the IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society, 2004. 272-282. [doi: 10.1109/SECPRI.2004.1301329]
-
(2004)
Proc. of the IEEE Symp. on Security and Privacy
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
van Doorn, L.3
Khosla, P.4
-
14
-
-
70349659108
-
Semantic remote attestation - A virtual machine directed approach to trusted computing
-
Berkley: USENIX Association
-
Haldar V, Chandra D, Franz M. Semantic remote attestation - A virtual machine directed approach to trusted computing. In: Proc. of the 3rd Virtual Machine Research & Technology Symp. Berkley: USENIX Association, 2004. 29-41.
-
(2004)
Proc. of the 3rd Virtual Machine Research & Technology Symp.
, pp. 29-41
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
15
-
-
24644439462
-
-
Technical Report, RZ3548, New York: IBM
-
Poritz J, Schunter M, Herreweghen EV, Waidner M. Property Attestation-Scalable and Privacy-Friendly Security Assessment of Peer Computers. Technical Report, RZ3548, New York: IBM, 2004.
-
(2004)
Property Attestation-Scalable and Privacy-Friendly Security Assessment of Peer Computers
-
-
Poritz, J.1
Schunter, M.2
Herreweghen, E.V.3
Waidner, M.4
-
16
-
-
33748087527
-
-
Technical Report, RT0564, Tokyo: IBM Tokyo Research Laboratory
-
Maruyama H, Seliger F, Nagaratnam N, Ebringer T, Munetoh S, Yoshihama S. Trusted Platform on Demand. Technical Report, RT0564, Tokyo: IBM Tokyo Research Laboratory, 2004.
-
(2004)
Trusted Platform on Demand
-
-
Maruyama, H.1
Seliger, F.2
Nagaratnam, N.3
Ebringer, T.4
Munetoh, S.5
Yoshihama, S.6
-
17
-
-
30144435491
-
Peer-to-Peer access control architecture using trusted computing technology
-
Ferrari E, ed. New York: ACM. [doi: 10.1145/1063979. 1064005]
-
Sandhu R, Zhang XW. Peer-to-Peer access control architecture using trusted computing technology. In: Ferrari E, ed. Proc. of the 10th ACM Symp. on Access Control Models and Technologies. New York: ACM, 2005. 147-158. [doi: 10.1145/1063979. 1064005]
-
(2005)
Proc. of the 10th ACM Symp. on Access Control Models and Technologies
, pp. 147-158
-
-
Sandhu, R.1
Zhang, X.W.2
-
18
-
-
34247346997
-
Secure information sharing enabled by trusted computing and PEI models
-
Lin FC, ed. New York: ACM. [doi: 10.1145/1128817. 1128820]
-
Sandhu R, Ranganathan K, Zhang XW. Secure information sharing enabled by trusted computing and PEI models. In: Lin FC, ed. Proc. of the 2006 ACM Symp. on Information, Computer and Communications Security. New York: ACM, 2006. 2-12. [doi: 10.1145/1128817. 1128820]
-
(2006)
Proc. of the 2006 ACM Symp. on Information, Computer and Communications Security
, pp. 2-12
-
-
Sandhu, R.1
Ranganathan, K.2
Zhang, X.W.3
-
19
-
-
0026405370
-
Checking the correctness of memories
-
Washington: IEEE Computer Society
-
Blum M, Evans W, Gemmell P, Kannan S, Naor M. Checking the correctness of memories. In: Proc. of the 32nd Annual Symp. on Foundations of Computer Science. Washington: IEEE Computer Society, 1991. 90-99.
-
(1991)
Proc. of the 32nd Annual Symp. on Foundations of Computer Science
, pp. 90-99
-
-
Blum, M.1
Evans, W.2
Gemmell, P.3
Kannan, S.4
Naor, M.5
-
20
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
[doi: 10.1145/356989.357005]
-
Lie D, Thekkath C, Mitchell M, Lincoln P, Boneh D, Mitchell J, Horowitz M. Architectural support for copy and tamper resistant software. ACM SIGPLAN Notices, 2000, 35(11): 168-177. [doi: 10.1145/356989.357005]
-
(2000)
ACM SIGPLAN Notices
, vol.35
, Issue.11
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
21
-
-
84955507265
-
Caches and hash trees for efficient memory integrity verification
-
Washington: IEEE Computer Society. [doi: 10.1109/HPCA.2003.1183547]
-
Gassend B, Suh GE, Clarke D, van Dijk M, Devadas S. Caches and hash trees for efficient memory integrity verification. In: Proc. of the 9th Int'l Symp. on High-Performance Computer Architecture. Washington: IEEE Computer Society, 2003. 295-306. [doi: 10.1109/HPCA.2003.1183547]
-
(2003)
Proc. of the 9th Int'l Symp. on High-Performance Computer Architecture
, pp. 295-306
-
-
Gassend, B.1
Suh, G.E.2
Clarke, D.3
van Dijk, M.4
Devadas, S.5
-
22
-
-
1142282726
-
-
Technical Report, MIT-LCS-TR-872, Cambridge: Massachusetts Institute of Technology
-
Suh GE, Clarke D, Gassend B, van Dijk M, Devadas S. Hardware Mechanism for Memory Integrity Checking. Technical Report, MIT-LCS-TR-872, Cambridge: Massachusetts Institute of Technology, 2002.
-
(2002)
Hardware Mechanism for Memory Integrity Checking
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
van Dijk, M.4
Devadas, S.5
-
23
-
-
1142280988
-
AEGIS: Architecture for tamper-evident and tamper-resistant processing
-
Banerjee U, ed. New York: ACM. [doi: 10.1145/ 782814.782838]
-
Suh GE, Clarke D, Gassend B, van Dijk M, Devadas S. AEGIS: Architecture for tamper-evident and tamper-resistant processing. In: Banerjee U, ed. Proc. of the 17th Annual Int'l Conf. on Supercomputing. New York: ACM, 2003. 160-171. [doi: 10.1145/ 782814.782838]
-
(2003)
Proc. of the 17th Annual Int'l Conf. on Supercomputing
, pp. 160-171
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
van Dijk, M.4
Devadas, S.5
-
24
-
-
34547182340
-
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
-
Juels A, ed. New York: ACM. [doi: 10.1145/1179474.1179485]
-
Sarmenta LFG, van Dijk M, O'Donnell CW, Rhodes J, Devadas S. Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. In: Juels A, ed. Proc. of the 1st ACM Workshop on Scalable Trusted Computing. New York: ACM, 2006. 27-42. [doi: 10.1145/1179474.1179485]
-
(2006)
Proc. of the 1st ACM Workshop on Scalable Trusted Computing
, pp. 27-42
-
-
Sarmenta, L.F.G.1
van Dijk, M.2
O'Donnell, C.W.3
Rhodes, J.4
Devadas, S.5
-
26
-
-
18844367451
-
Optimal parameter selection for efficient memory integrity verification using Merkle hash trees
-
Washington: IEEE Computer Society. [doi: 10.1109/NCA.2004.1347805]
-
Williams D, Sirer EG. Optimal parameter selection for efficient memory integrity verification using Merkle hash trees. In: Proc. of the 3rd IEEE Int'l Symp. on Network Computing and Applications. Washington: IEEE Computer Society, 2004. 383-388. [doi: 10.1109/NCA.2004.1347805]
-
(2004)
Proc. of the 3rd IEEE Int'l Symp. on Network Computing and Applications
, pp. 383-388
-
-
Williams, D.1
Sirer, E.G.2
|