-
1
-
-
54249165796
-
-
1st edn. IBM Press
-
Challener D, Yoder K, Catherman R, Safford D, van Doorn L,. A Practical Guide to Trusted Computing, 1st edn. IBM Press. 2008.
-
(2008)
A Practical Guide to Trusted Computing
-
-
Challener, D.1
Yoder, K.2
Catherman, R.3
Safford, D.4
Van Doorn, L.5
-
2
-
-
84863726926
-
Worldwide interfaces and technologies embedded in PCs 2010-2014 forecast
-
Shim R, Mainelli T, O'Donnell B, Chute C, Pulskamp F, Rau S,. Worldwide interfaces and technologies embedded in PCs 2010-2014 forecast. Technical Report Technical Report, IDC, 2010.
-
(2010)
Technical Report Technical Report, IDC
-
-
Shim, R.1
Mainelli, T.2
O'Donnell, B.3
Chute, C.4
Pulskamp, F.5
Rau, S.6
-
3
-
-
0000747576
-
Multiparadigm communications in Java for grid computing
-
Getov V, von Laszewski G, Philippsen M, Foster IT,. Multiparadigm communications in Java for grid computing. Communications of the ACM 2001; 44 (10): 118-125.
-
(2001)
Communications of the ACM
, vol.44
, Issue.10
, pp. 118-125
-
-
Getov, V.1
Von Laszewski, G.2
Philippsen, M.3
Foster, I.T.4
-
4
-
-
84863721943
-
-
Technical Report, Technical Report Sirrix AG
-
Selhorst M, Stueble C, Teerkorn F,. TSS Study, Technical Report, Technical Report, Sirrix AG, 2008.
-
(2008)
TSS Study
-
-
Selhorst, M.1
Stueble, C.2
Teerkorn, F.3
-
6
-
-
74049139869
-
Towards platform-independent trusted computing
-
ACM: New York, NY
-
Toegl R, Winkler T, Nauman M, Hong T,. Towards platform-independent trusted computing. STC '09: Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing. ACM: New York, NY, 2009; 61-66, DOI
-
(2009)
STC '09: Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing
, pp. 61-66
-
-
Toegl, R.1
Winkler, T.2
Nauman, M.3
Hong, T.4
-
7
-
-
84863716207
-
-
JSR321 Expert Group Proposed final draft, Java Community Process 4 2011. version 11.04 [27 May 2011]
-
JSR321 Expert Group. JSR 321 Trusted Computing API for Java™. Proposed final draft, Java Community Process 4 2011. URL, version 11.04 [27 May 2011].
-
JSR 321 Trusted Computing API for Java™
-
-
-
9
-
-
77952348386
-
-
ISBN 978-1934053171. Richard Bowles: Intel Press, Intel Corporation, 2111 NE 25th Avenue, JF3-330, Hillsboro, OR 97124-5961
-
Grawrock D,. Dynamics of a Trusted Platform: A Building Block Approach, ISBN 978-1934053171. Richard Bowles: Intel Press, Intel Corporation, 2111 NE 25th Avenue, JF3-330, Hillsboro, OR 97124-5961, 2009.
-
(2009)
Dynamics of A Trusted Platform: A Building Block Approach
-
-
Grawrock, D.1
-
11
-
-
34547196300
-
A protocol for property- based attestation
-
Chen L, Landfermann R, Löhr H, Rohe M, Sadeghi AR, Stüble C,. A protocol for property- based attestation. STC '06: Proceedings of the First ACM Workshop on Scalable Trusted Computing. ACM, 2006.
-
(2006)
STC '06: Proceedings of the First ACM Workshop on Scalable Trusted Computing
-
-
Chen, L.1
Landfermann, R.2
Löhr, H.3
Rohe, M.4
Sadeghi, A.R.5
Stüble, C.6
-
16
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
USENIX Association: San Diego, CA
-
Sailer R, Zhang X, Jaeger T, van Doorn L,. Design and implementation of a TCG-based integrity measurement architecture. Proceedings of the 13th conference on USENIX Security Symposium-Volume 13. USENIX Association: San Diego, CA, 2004; 16-16.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13
, pp. 16-16
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
19
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
ACM: New York, NY
-
Garfinkel T, Pfaff B, Chow J, Rosenblum M, Boneh D,. Terra: a virtual machine-based platform for trusted computing. SOSP '03: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles. ACM: New York, NY, 2003; 193-206, DOI
-
(2003)
SOSP '03: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
20
-
-
57049135781
-
Attestation: Evidence and trust
-
Coker G, Guttman J, Loscocco P, Sheehy J, Sniffen B,. Attestation: Evidence and trust. Information and Communications Security 2008: 1-18. URL
-
(2008)
Information and Communications Security
, pp. 1-18
-
-
Coker, G.1
Guttman, J.2
Loscocco, P.3
Sheehy, J.4
Sniffen, B.5
-
23
-
-
77952359310
-
Towards a virtual trusted platform
-
[27 May 2011]
-
Pirker M, Toegl R,. Towards a virtual trusted platform. Journal of Universal Computer Science 2010; 16 (4): 531-542. [27 May 2011].
-
(2010)
Journal of Universal Computer Science
, vol.16
, Issue.4
, pp. 531-542
-
-
Pirker, M.1
Toegl, R.2
-
25
-
-
82055200280
-
AcTvSM: A dynamic virtualization platform for enforcement of application integrity
-
Lecture Notes in Computer Science Springer
-
Toegl R, Pirker M, Gissing M,. acTvSM: A dynamic virtualization platform for enforcement of application integrity, Proceedings of INTRUST 2010: The Second International Conference on Trusted Systems. Lecture Notes in Computer Science, Vol. 6802, Springer, 2011.
-
(2011)
Proceedings of INTRUST 2010: The Second International Conference on Trusted Systems
, vol.6802
-
-
Toegl, R.1
Pirker, M.2
Gissing, M.3
-
26
-
-
77955186544
-
Trustvisor: Efficient tcb reduction and attestation
-
IEEE
-
McCune J, Li Y, Qu N, Zhou Z, Datta A, Gligor V, Perrig A,. Trustvisor: Efficient tcb reduction and attestation, IEEE Symposium on Security and Privacy. IEEE, 2010.
-
(2010)
IEEE Symposium on Security and Privacy
-
-
McCune, J.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
28
-
-
70350639602
-
A PrivacyCA for anonymity and trust
-
Springer
-
Pirker M, Toegl R, Hein D, Danner P,. A PrivacyCA for anonymity and trust. Proc. Trust '09, LNCS, Vol. 5471. Springer, 2009.
-
(2009)
Proc. Trust '09, LNCS
, vol.5471
-
-
Pirker, M.1
Toegl, R.2
Hein, D.3
Danner, P.4
-
29
-
-
14844295011
-
Direct anonymous attestation
-
Brickell E, Camenisch J, Chen L,. Direct anonymous attestation, Proc. CCS '04. ACM, 2004; 132-145, DOI
-
(2004)
Proc. CCS '04. ACM
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
30
-
-
77954641220
-
-
Decker B.D. Schaumüller-Bichl I. (eds). Springer
-
Dietrich K,. Anonymous client authentication for transport layer security, Communications and Multimedia Security Lecture Notes in Computer Science, Vol. 6109, Decker BD, Schaumüller-Bichl I, (eds). Springer, 2010; 268-280.
-
(2010)
Anonymous Client Authentication for Transport Layer Security, Communications and Multimedia Security Lecture Notes in Computer Science
, vol.6109
, pp. 268-280
-
-
Dietrich, K.1
-
31
-
-
33749636538
-
-
RSA Laboratories RSA Security Inc. Public-Key Cryptography Standards (PKCS), June. [27 May 2011]
-
RSA Laboratories. PKCS #11 v2.20: Cryptographic Token Interface Standard, RSA Security Inc. Public-Key Cryptography Standards (PKCS), June 2004. [27 May 2011].
-
(2004)
PKCS #11 v2.20: Cryptographic Token Interface Standard
-
-
-
33
-
-
79952128502
-
The trusted platform agent
-
Cabiddu G, Cesena E, Sassu R, Vernizzi D, Ramunno G, Lioy A,. The trusted platform agent. IEEE Software 2011; 28: 35-41.
-
(2011)
IEEE Software
, vol.28
, pp. 35-41
-
-
Cabiddu, G.1
Cesena, E.2
Sassu, R.3
Vernizzi, D.4
Ramunno, G.5
Lioy, A.6
-
34
-
-
82055196684
-
Seamless integration of trusted computing into standard cryptographic frameworks
-
Lecture Notes in Computer Science, Springer Springer
-
Reiter A, Neubauer G, Kapfenberger M, Winter J, Dietrich K,. Seamless integration of trusted computing into standard cryptographic frameworks, Proceedings of INTRUST 2010: The Second International Conference on Trusted Systems. Lecture Notes in Computer Science, Springer, Vol. 6802, Springer, 2011.
-
(2011)
Proceedings of INTRUST 2010: The Second International Conference on Trusted Systems
, vol.6802
-
-
Reiter, A.1
Neubauer, G.2
Kapfenberger, M.3
Winter, J.4
Dietrich, K.5
-
35
-
-
84863718732
-
-
Microsoft Microsoft Developer Network, [27 May 2011]
-
Microsoft. TPM Base Services. Microsoft Developer Network, 2007. [27 May 2011].
-
(2007)
TPM Base Services
-
-
-
36
-
-
38049040255
-
Enhancing grid security using trusted virtualization
-
LNCS
-
Löhr H, Ramasamy HV, Sadeghi AR, Schulz S, Schunter M, Stüble C,. Enhancing grid security using trusted virtualization. Proc. ATC, Vol. 4610. LNCS, 2007; 372-384.
-
(2007)
Proc. ATC
, vol.4610
, pp. 372-384
-
-
Löhr, H.1
Ramasamy, H.V.2
Sadeghi, A.R.3
Schulz, S.4
Schunter, M.5
Stüble, C.6
-
37
-
-
54249152917
-
Towards trust services for language-based virtual machines for grid computing
-
Springer
-
Vejda T, Toegl R, Pirker M, Winkler T,. Towards Trust Services for Language-Based Virtual Machines for Grid Computing. Proc. Trust 2008, LNCS, Vol. 4968. Springer, 2008.
-
(2008)
Proc. Trust 2008, LNCS
, vol.4968
-
-
Vejda, T.1
Toegl, R.2
Pirker, M.3
Winkler, T.4
-
38
-
-
35248861213
-
Mobile agents and the deus ex machine
-
IEEE Computer Society
-
Balfe S, Gallery E,. Mobile agents and the deus ex machina, Proceedings of the Advanced Information Networking and Applications Workshops, 2007, AINAW '07. 21st International Conference on. IEEE Computer Society, 2007.
-
(2007)
Proceedings of the Advanced Information Networking and Applications Workshops, 2007, AINAW '07. 21st International Conference on
-
-
Balfe, S.1
Gallery, E.2
-
39
-
-
71549173398
-
Innovations for grid security from trusted computing
-
Springer
-
Mao W, Jin H, Martin A,. Innovations for grid security from trusted computing. Security Protocols, Lecture Notes in Computer Science, Vol. 5087. Springer, 2009. URL
-
(2009)
Security Protocols, Lecture Notes in Computer Science
, vol.5087
-
-
Mao, W.1
Jin, H.2
Martin, A.3
-
40
-
-
33746953456
-
Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques
-
Smith M, Friese T, Engel M, Freisleben B,. Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques. Journal of Parallel and Distributed Computing 2006; 66 (9): 1189-1204.
-
(2006)
Journal of Parallel and Distributed Computing
, vol.66
, Issue.9
, pp. 1189-1204
-
-
Smith, M.1
Friese, T.2
Engel, M.3
Freisleben, B.4
-
41
-
-
79959563402
-
An integrated architecture for trusted computing for Java enabled embedded devices
-
ACM: Alexandria, VA
-
Dietrich K,. An integrated architecture for trusted computing for Java enabled embedded devices. Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing. ACM: Alexandria, VA, 2007; 2-6, DOI
-
(2007)
Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing
, pp. 2-6
-
-
Dietrich, K.1
-
42
-
-
41549096799
-
A practical approach for establishing trust relationships between remote platforms using trusted computing
-
Springer Verlag
-
Dietrich K, Pirker M, Vejda T, Toegl R, Winkler T, Lipp P,. A practical approach for establishing trust relationships between remote platforms using trusted computing. Lecture Notes in Computer Science, Vol. 4912, Springer Verlag, 2008; 156-168.
-
(2008)
Lecture Notes in Computer Science
, vol.4912
, pp. 156-168
-
-
Dietrich, K.1
Pirker, M.2
Vejda, T.3
Toegl, R.4
Winkler, T.5
Lipp, P.6
-
43
-
-
34547182340
-
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
-
Sarmenta L, van Dijk M, O'Donnell C, Rhodes J, Devadas S,. Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. Proc. STC '06. ACM, 2006.
-
(2006)
Proc. STC '06. ACM
-
-
Sarmenta, L.1
Van Dijk, M.2
O'Donnell, C.3
Rhodes, J.4
Devadas, S.5
-
44
-
-
70349248601
-
Behavioral attestation for web services (ba4ws)
-
ACM: Alexandria, VA
-
Alam M, Zhang X, Nauman M, Ali T,. Behavioral attestation for web services (ba4ws). Proceedings of the 2008 ACM Workshop on Secure Web Services. ACM: Alexandria, VA, 2008; 21-28.
-
(2008)
Proceedings of the 2008 ACM Workshop on Secure Web Services
, pp. 21-28
-
-
Alam, M.1
Zhang, X.2
Nauman, M.3
Ali, T.4
-
45
-
-
77952281110
-
Providing secure services for a virtual infrastructure
-
January:. DOI
-
Baldwin A, Dalton C, Shiu S, Kostienko K, Rajpoot Q,. Providing secure services for a virtual infrastructure. SIGOPS Operating Systems Review January 2009 43: 44-51. DOI
-
(2009)
SIGOPS Operating Systems Review
, vol.43
, pp. 44-51
-
-
Baldwin, A.1
Dalton, C.2
Shiu, S.3
Kostienko, K.4
Rajpoot, Q.5
-
46
-
-
70350334117
-
Trusted watermarks
-
BMSB '09. IEEE International Symposium on DOI: 10.1109/ISBMSB.2009. 5133835
-
Brett A, Kuntze N, Schmidt A,. Trusted watermarks. Broadband Multimedia Systems and Broadcasting, 2009. BMSB '09. IEEE International Symposium on, 2009; 1-7, DOI: 10.1109/ISBMSB.2009.5133835.
-
(2009)
Broadband multimedia systems and broadcasting, 2009
, pp. 1-7
-
-
Brett, A.1
Kuntze, N.2
Schmidt, A.3
-
47
-
-
70350645491
-
Trustable remote verification of web services
-
Chen L. Mitchell C. Martin A. (eds). Springer Berlin / Heidelberg
-
Lyle J,. Trustable remote verification of web services. Proc. Trust 2009: Trusted Computing, LNCS, Vol. 5471, Chen L, Mitchell C, Martin A, (eds). Springer Berlin / Heidelberg, 2009; 153-168.
-
(2009)
Proc. Trust 2009: Trusted Computing, LNCS
, vol.5471
, pp. 153-168
-
-
Lyle, J.1
-
49
-
-
70350633575
-
Tagging the turtle: Local attestation for kiosk computing. Advances in Information Security and Assurance
-
Park J.H. Chen H.H. Atiquzzaman M. Lee C. hoon Kim T. Yeo S.S. (eds). Springer Berlin / Heidelberg
-
Toegl R,. Tagging the turtle: Local attestation for kiosk computing. Advances in Information Security and Assurance, Lecture Notes in Computer Science, Vol. 5576, Park JH, Chen HH, Atiquzzaman M, Lee C, hoon Kim T, Yeo SS, (eds). Springer Berlin / Heidelberg, 2009; 60-69, DOI
-
(2009)
Lecture Notes in Computer Science
, vol.5576
, pp. 60-69
-
-
Toegl, R.1
-
56
-
-
84910156435
-
VTPM virtualizing the trusted platform module
-
Berger S, Cáceres R, Goldman KA, Perez R, Sailer R, van Doorn L,. vTPM virtualizing the trusted platform module. USENIX-SS'06: Proceedings of the 15th Conference on USENIX Security Symposium, 2006; 305-320.
-
(2006)
USENIX-SS'06: Proceedings of the 15th Conference on USENIX Security Symposium
, pp. 305-320
-
-
Berger, S.1
Cáceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
Van Doorn, L.6
-
57
-
-
37149035513
-
An approach to a trustworthy system architecture using virtualization
-
Xiao B. Yang L.T. Ma J. Müller-Schloer C. Hua Y. (eds). Springer
-
Stumpf F, Benz M, Hermanowski M, Eckert C,. An approach to a trustworthy system architecture using virtualization. ATC, Lecture Notes in Computer Science, Vol. 4610, Xiao B, Yang LT, Ma J, Müller-Schloer C, Hua Y, (eds). Springer, 2007; 191-202.
-
(2007)
ATC, Lecture Notes in Computer Science
, vol.4610
, pp. 191-202
-
-
Stumpf, F.1
Benz, M.2
Hermanowski, M.3
Eckert, C.4
-
58
-
-
54049153566
-
TVDc: Managing security in the trusted virtual datacenter
-
Berger S, Cáceres R, Pendarakis D, Sailer R, Valdez E, Perez R, Schildhauer W, Srinivasan D,. TVDc: Managing security in the trusted virtual datacenter. SIGOPS Operating Systems Review 2008; 42 (1): 40-47. DOI
-
(2008)
SIGOPS Operating Systems Review
, vol.42
, Issue.1
, pp. 40-47
-
-
Berger, S.1
Cáceres, R.2
Pendarakis, D.3
Sailer, R.4
Valdez, E.5
Perez, R.6
Schildhauer, W.7
Srinivasan, D.8
-
64
-
-
77953274755
-
Attack, solution and verification for shared authorisation data in tcg tpm
-
Lecture Notes in Computer Science, Degano P. Guttman J. (eds)
-
Chen L, Ryan MD,. Attack, solution and verification for shared authorisation data in tcg tpm. Proceedings of Sixth International Workshop on Formal Aspects in Security and Trust (FAST'09), Lecture Notes in Computer Science, Vol. 5983, Degano P, Guttman J, (eds). 2010.
-
(2010)
Proceedings of Sixth International Workshop on Formal Aspects in Security and Trust (FAST'09)
, vol.5983
-
-
Chen, L.1
Ryan, M.D.2
|