메뉴 건너뛰기




Volumn 10, Issue 2, 2011, Pages 63-81

Principles of remote attestation

Author keywords

Cryptographic protocols; Hardware Security Modules; Operating system security architecture; Strand spaces; Trust and attestation

Indexed keywords

CRYPTOGRAPHIC PROTOCOLS; HARDWARE SECURITY MODULES; OPERATING SYSTEM SECURITY ARCHITECTURE; STRAND SPACE; TRUST AND ATTESTATION;

EID: 79957511284     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-011-0124-7     Document Type: Article
Times cited : (185)

References (42)
  • 14
    • 3042563843 scopus 로고    scopus 로고
    • Authentication tests and disjoint encryption: a design method for security protocols
    • Guttman J. D.: Authentication tests and disjoint encryption: a design method for security protocols. J. Comput. Secur. 12(3/4), 409-433 (2004).
    • (2004) J. Comput. Secur. , vol.12 , Issue.3-4 , pp. 409-433
    • Guttman, J.D.1
  • 20
    • 78751681870 scopus 로고    scopus 로고
    • Advanced tactic targeted grocer: 'Malware' stole Hannaford data
    • 18 March
    • Kerber, R.: Advanced tactic targeted grocer: 'Malware' stole Hannaford data. The Boston Globe, p. 1, 18 March (2008).
    • (2008) The Boston Globe , pp. 1
    • Kerber, R.1
  • 24
    • 79957516348 scopus 로고
    • The SMV system
    • McMillan, K.: (1992) The SMV system. http://www. kenmcmil. com.
    • (1992)
    • McMillan, K.1
  • 25
    • 79957459765 scopus 로고    scopus 로고
    • Call by Contract for Cryptographic Protocol
    • Millen, J., Guttman, J., Ramsdell, J., Sheehy, J., Sniffen, B.: Call by Contract for Cryptographic Protocol. In: FCS-ARSPA (2006) http://www. mitre. org/work/tech_papers/tech_papers_06/06_0498/index. html.
    • (2006) FCS-ARSPA
    • Millen, J.1    Guttman, J.2    Ramsdell, J.3    Sheehy, J.4    Sniffen, B.5
  • 28
    • 33751027456 scopus 로고    scopus 로고
    • Computing, signed code and the heat death of the internet
    • ACM Press, New York, NY, USA Trust[ed {pipe} in]
    • Poritz, J. A.: computing, signed code and the heat death of the internet. In: SAC '06: Proceedings of the 2006 ACM Symposium on Applied Computing, pp. 1855-1859. ACM Press, New York, NY, USA (2006) Trust[ed {pipe} in].
    • (2006) SAC '06: Proceedings of the 2006 ACM Symposium on Applied Computing , pp. 1855-1859
    • Poritz, J.A.1
  • 29
    • 29244450159 scopus 로고    scopus 로고
    • Property-based attestation for computing platforms: Caring about properties, not mechanisms
    • ACM Press, New York, NY, USA
    • Sadeghi, A.-R., Stüble, C.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: NSPW '04: Proceedings, 2004 Workshop on New Security Paradigms, pp. 67-77. ACM Press, New York, NY, USA (2004).
    • (2004) NSPW '04: Proceedings, 2004 Workshop on New Security Paradigms , pp. 67-77
    • Sadeghi, A.-R.1    Stüble, C.2
  • 31
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • USENIX Association, Berkeley, CA, USA
    • Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the 13th USENIX Security Symposium, pp. 16-16. USENIX Association, Berkeley, CA, USA (2004).
    • (2004) Proceedings of the 13th USENIX Security Symposium , pp. 16-16
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    van Doorn, L.4
  • 32
    • 39149110948 scopus 로고    scopus 로고
    • Remote attestation on legacy operating systems with trusted platform modules
    • Schellekens D., Wyseur B., Preneel B.: Remote attestation on legacy operating systems with trusted platform modules. Electron. Notes Theor. Comput. Sci. 197(1), 59-72 (2008).
    • (2008) Electron. Notes Theor. Comput. Sci. , vol.197 , Issue.1 , pp. 59-72
    • Schellekens, D.1    Wyseur, B.2    Preneel, B.3
  • 36
    • 79957525720 scopus 로고    scopus 로고
    • 11 charged in theft of 41 million card numbers
    • p.B 1, 5 August
    • Stone, B.: 11 charged in theft of 41 million card numbers. The New York Times, p. B 1, 5 August (2008).
    • (2008) The New York Times
    • Stone, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.