-
1
-
-
84883020601
-
Security architecture for device encryption and VPN
-
S. Paulus, N. Pohlmann, and H. Reimer, editors, Vieweg Verlag
-
A. Alkassar, M. Scheibel, A.-R. Sadeghi, C. Stble, and M. Winandy. Security architecture for device encryption and VPN. In S. Paulus, N. Pohlmann, and H. Reimer, editors, ISSE 2006-Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2006 Conference, pages 54-63. Vieweg Verlag, 2006.
-
(2006)
ISSE 2006-Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2006 Conference
, pp. 54-63
-
-
Alkassar, A.1
Scheibel, M.2
Sadeghi, A.-R.3
Stble, C.4
Winandy, M.5
-
2
-
-
1142305232
-
Cryptography and competition policy-issues with trusted computing
-
ACM Press
-
R. J. Anderson. Cryptography and competition policy-issues with trusted computing. In Proceedings of PODC’03, July 13-16, 2003, Boston, Massachsetts, pages 3-10. ACM Press, 2003.
-
(2003)
Proceedings of PODC’03, July 13-16, 2003, Boston, Massachsetts
, pp. 3-10
-
-
Anderson, R.J.1
-
5
-
-
0030672130
-
A secure and reliable bootstrap architecture
-
Oakland, CA, May, IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press
-
W. A. Arbaugh, D. J. Farber, and J. M. Smith. A secure and reliable bootstrap architecture. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 65-71, Oakland, CA, May 1997. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press.
-
(1997)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 65-71
-
-
Arbaugh, W.A.1
Farber, D.J.2
Smith, J.M.3
-
6
-
-
70349245595
-
An efficient implementation of trusted channels based on openssl
-
ACM Press
-
F. Armknecht, Y. Gasmi, A.-R. Sadeghi, P. Stewin, M. Unger, G. Ramunno, and D. Vernizzi. An efficient implementation of trusted channels based on openssl. In Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, Alexandria, Virginia, pages 41-50. ACM Press, 2008.
-
(2008)
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, Alexandria, Virginia
, pp. 41-50
-
-
Armknecht, F.1
Gasmi, Y.2
Sadeghi, A.-R.3
Stewin, P.4
Unger, M.5
Ramunno, G.6
Vernizzi, D.7
-
7
-
-
77956156122
-
Enabling fairer digital rights management with trusted computing
-
J. A. Garay, A. K. Lenstra, M. Mambo, and R. Peralta, editors, Springer
-
N. Asokan, J.-E. Ekberg, A.-R. Sadeghi, C. Stüble, and M. Wolf. Enabling fairer digital rights management with trusted computing. In J. A. Garay, A. K. Lenstra, M. Mambo, and R. Peralta, editors, Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings. Lecture Notes in Computer Science, page 4779. Springer, 2007.
-
(2007)
Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings. Lecture Notes in Computer Science
, pp. 4779
-
-
Asokan, N.1
Ekberg, J.-E.2
Sadeghi, A.-R.3
Stüble, C.4
Wolf, M.5
-
8
-
-
0242539792
-
A trusted process to digitally sign a document
-
V. Raskin and C. F. Hempelmann, editors, ACM Press
-
B. Balache, L. Chen, D. Plaquin, and G. Proudler. A trusted process to digitally sign a document. In V. Raskin and C. F. Hempelmann, editors, Proceedings of the 2001 New Security Paradigms Workshop, pages 79-86. ACM Press, 2001.
-
(2001)
Proceedings of the 2001 New Security Paradigms Workshop
, pp. 79-86
-
-
Balache, B.1
Chen, L.2
Plaquin, D.3
Proudler, G.4
-
9
-
-
68149125013
-
Crimeware and trusted computing
-
M. Jakobsson and Z. Ramzan, editors, Addison-Wesley/Symantec Press
-
S. Balfe, E. Gallery, C. J. Mitchell, and K. G. Paterson. Crimeware and trusted computing. In M. Jakobsson and Z. Ramzan, editors, Crimeware: Understanding New Attacks and Defenses, Addison-Wesley/Symantec Press, 2008.
-
(2008)
Crimeware: Understanding New Attacks and Defenses
-
-
Balfe, S.1
Gallery, E.2
Mitchell, C.J.3
Paterson, K.G.4
-
10
-
-
85013594843
-
Securing peer-to-peer networks using trusted computing
-
C. J. Mitchell, editor, IEEE Press
-
S. Balfe, A. D. Lakhani, and K. G. Paterson. Securing peer-to-peer networks using trusted computing. In C. J. Mitchell, editor, Trusted Computing, pages 271-298. IEEE Press, 2005.
-
(2005)
Trusted Computing
, pp. 271-298
-
-
Balfe, S.1
Lakhani, A.D.2
Paterson, K.G.3
-
12
-
-
4444265683
-
Xen and the art of virtualization
-
T. C. Bressoud and M. F. Kaashoek, editors, Stevenson, WA, October 14-17
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In T. C. Bressoud and M. F. Kaashoek, editors, Proceedings of the 21st ACM Symposium on Operating Systems Principles, 2007, SOSP 2007, Stevenson, WA, October 14-17, 2007.
-
(2007)
Proceedings of the 21st ACM Symposium on Operating Systems Principles, 2007, SOSP 2007
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
13
-
-
33845521537
-
-
Technical Report NPS-CS-05-010, Naval Postgraduate School, September
-
T. V. Benzel, C. E. Irvine, T. E. Levin, G. Bhaskara, T. D. Nguyen, and P. C. Clark. Design principles for security. Technical Report NPS-CS-05-010, Naval Postgraduate School, September 2005.
-
(2005)
Design principles for security.
-
-
Benzel, T.V.1
Irvine, C.E.2
Levin, T.E.3
Bhaskara, G.4
Nguyen, T.D.5
Clark, P.C.6
-
14
-
-
84910156435
-
vTPM: Virtualizing the Trusted Platform Module
-
USENIX, August
-
S. Berger, R. Caceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn. vTPM:Virtualizing the Trusted Platform Module. In Proceedings of the 15th USENIX Security Symposium, pages 305-320. USENIX, August 2006.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
, pp. 305-320
-
-
Berger, S.1
Caceres, R.2
Goldman, K.A.3
Perez, R.4
Sailer, R.5
van Doorn, L.6
-
15
-
-
54049153566
-
TVDc: Managing security in the trusted virtual datacenter
-
S. Berger, R. Cáceres, D. E. Pendarakis, R. Sailer, E. Valdez, R. Perez, W. Schildhauer, and D. Srinivasan. TVDc: Managing security in the trusted virtual datacenter. Operating Systems Review, 42(1):40-47, 2008.
-
(2008)
Operating Systems Review
, vol.42
, Issue.1
, pp. 40-47
-
-
Berger, S.1
Cáceres, R.2
Pendarakis, D.E.3
Sailer, R.4
Valdez, E.5
Perez, R.6
Schildhauer, W.7
Srinivasan, D.8
-
16
-
-
14844295011
-
Direct anonymous attestation
-
V. Atluri, B. Pfitzmann, and P. D. McDaniel, editors, Washington D.C., October 25-29
-
E. Brickell, J. Camenisch, and L. Chen. Direct anonymous attestation. In V. Atluri, B. Pfitzmann, and P. D. McDaniel, editors, Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington D.C., October 25-29, 2004.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
18
-
-
85054457689
-
-
ECRYPT Workshop, CRASH-CRyptographic Advances in Secure Hardware
-
J. Brizek, M. Khan, J.-P. Seifert, and D. A. Wheeler. Platform-level trust-architecture for hand-held devices. ECRYPT Workshop, CRASH-CRyptographic Advances in Secure Hardware, 2005.
-
(2005)
Platform-level trust-architecture for hand-held devices.
-
-
Brizek, J.1
Khan, M.2
Seifert, J.-P.3
Wheeler, D.A.4
-
19
-
-
85054459681
-
-
May
-
Bundesamt fr Sicherheit in der Informationstechnik (BSI). Sichere Inter-Netzwerk Architektur (SINA). http://www.bsi.de/fachthem/sina/, May 2009.
-
(2009)
Sichere Inter-Netzwerk Architektur (SINA)
-
-
-
20
-
-
70350642949
-
-
Technical Report RC23792, IBM Research
-
A. Bussani, J. L. Griffin, B. Jansen, K. Julisch, G. Karjoth, H. Maruyama, M. Nakamura, R. Perez, M. Schunter, A. Tanner, L. V. Doorn, E. A. V. Herreweghen, M.Waidner, and S. Yoshihama. Trusted Virtual Domains: Secure foundations for business and IT services. Technical Report RC23792, IBM Research, 2005.
-
(2005)
Trusted Virtual Domains: Secure foundations for business and IT services.
-
-
Bussani, A.1
Griffin, J.L.2
Jansen, B.3
Julisch, K.4
Karjoth, G.5
Maruyama, H.6
Nakamura, M.7
Perez, R.8
Schunter, M.9
Tanner, A.10
Doorn, L.V.11
Herreweghen, E.A.V.12
Waidner, M.13
Yoshihama, S.14
-
21
-
-
70350673437
-
Towards automated provisioning of secure virtualized networks
-
New York, ACM
-
S. Cabuk, C. I. Dalton, H. Ramasamy, and M. Schunter. Towards automated provisioning of secure virtualized networks. In CCS '07: Proceedings of the 14th ACM Conference on Computer and Communications Security, pages 235-245, New York, 2007. ACM.
-
(2007)
CCS '07: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 235-245
-
-
Cabuk, S.1
Dalton, C.I.2
Ramasamy, H.3
Schunter, M.4
-
22
-
-
0004282359
-
-
RFC 3588 (Proposed Standard), September
-
P. Calhoun, J. Loughney, E. Guttman, G. Zorn, and J. Arkko. Diameter Base Protocol. RFC 3588 (Proposed Standard), September 2003.
-
(2003)
Diameter Base Protocol.
-
-
Calhoun, P.1
Loughney, J.2
Guttman, E.3
Zorn, G.4
Arkko, J.5
-
23
-
-
35048847167
-
Better privacy for trusted computing platforms (extended abstract)
-
P. Samarati, D. Gollmann, and R. Molva, editors, Springer-Verlag
-
J. Camenisch. Better privacy for trusted computing platforms (extended abstract). In P. Samarati, D. Gollmann, and R. Molva, editors, Computer Security-ESORICS 2004, 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, volume 3193 of Lecture Notes in Computer Science, pages 73-88. Springer-Verlag, 2004.
-
(2004)
Computer Security-ESORICS 2004, 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, volume 3193 of Lecture Notes in Computer Science
, pp. 73-88
-
-
Camenisch, J.1
-
24
-
-
18844373581
-
-
Technical report, Microsoft Content Security Business Unit, August
-
A. Carroll, M. Juarez, J. Polk, and T. Leininger. Microsoft “Palladium”: A business overview. Technical report, Microsoft Content Security Business Unit, August 2002.
-
(2002)
Microsoft “Palladium”: A business overview.
-
-
Carroll, A.1
Juarez, M.2
Polk, J.3
Leininger, T.4
-
25
-
-
34547196300
-
A protocol for property-based attestation
-
ACM Press
-
L. Chen, R. Landfermann, H. Loehr, M. Rohe, A.-R. Sadeghi, and C. Stüble. A protocol for property-based attestation. In Proceedings of the 1st ACM Workshop on Scalable Trusted Computing (STC’06). ACM Press, 2006.
-
(2006)
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing (STC’06).
-
-
Chen, L.1
Landfermann, R.2
Loehr, H.3
Rohe, M.4
Sadeghi, A.-R.5
Stüble, C.6
-
27
-
-
57049110449
-
On proofs of security for DAA schemes
-
J. Baek, F. Bao, K. Chen, and X. Lai, editors, Springer-Verlag
-
L. Chen, P. Morrissey, and N. P. Smart. On proofs of security for DAA schemes. In J. Baek, F. Bao, K. Chen, and X. Lai, editors, Provable Security-Second International Conference, ProvSec 2008, Shanghai, China, October 30-November 1, 2008, Proceedings, volume 5324 of Lecture Notes in Computer Science, pages 156-175. Springer-Verlag, 2008.
-
(2008)
Provable Security-Second International Conference, ProvSec 2008, Shanghai, China, October 30-November 1, 2008, Proceedings, volume 5324 of Lecture Notes in Computer Science
, pp. 156-175
-
-
Chen, L.1
Morrissey, P.2
Smart, N.P.3
-
28
-
-
52149086372
-
Pairings in trusted computing
-
S. D. Galbraith and K. G. Paterson, editors, Springer-Verlag
-
L. Chen, P. Morrissey, and N. P. Smart. Pairings in trusted computing. In S. D. Galbraith and K. G. Paterson, editors, Pairing-Based Cryptography-Pairing 2008, Second International Conference, Egham, U.K., September 1-3, 2008, Proceedings, volume 5209 of Lecture Notes in Computer Science, pages 1-17. Springer-Verlag, 2008.
-
(2008)
Pairing-Based Cryptography-Pairing 2008, Second International Conference, Egham, U.K., September 1-3, 2008, Proceedings, volume 5209 of Lecture Notes in Computer Science
, pp. 1-17
-
-
Chen, L.1
Morrissey, P.2
Smart, N.P.3
-
29
-
-
0033659712
-
On enhancing biometric authentication with data protection
-
R. J. Howlett and L. C. Jain, editors, IEEE Computer Society
-
L. Chen, S. Pearson, and A. Vamvakas. On enhancing biometric authentication with data protection. In R. J. Howlett and L. C. Jain, editors, Proceedings of the Fourth International Conference on Knowledge-Based Intelligent Engineering Systems and Allied Technologies, pages 249-252. IEEE Computer Society, 2000.
-
(2000)
Proceedings of the Fourth International Conference on Knowledge-Based Intelligent Engineering Systems and Allied Technologies
, pp. 249-252
-
-
Chen, L.1
Pearson, S.2
Vamvakas, A.3
-
30
-
-
85054438403
-
Offline dictionary attack on TCG TPM weak authorization data, and solution
-
D. Grawrock, H. Reimer, A.-R. Sadeghi, and C. Vishik, editors, Vieweg & Teubner
-
L. Chen and M. D. Ryan. Offline dictionary attack on TCG TPM weak authorization data, and solution. In D. Grawrock, H. Reimer, A.-R. Sadeghi, and C. Vishik, editors, Future of Trust in Computing. Vieweg & Teubner, 2008.
-
(2008)
Future of Trust in Computing.
-
-
Chen, L.1
Ryan, M.D.2
-
31
-
-
0003765587
-
-
Norm Version 2.1, CCIMB-99-031-33, Common Criteria Project Sponsoring Organisations, August
-
Common Criteria Project Sponsoring Organisations. Common criteria for information technology security evaluation. Norm Version 2.1, CCIMB-99-031-33, Common Criteria Project Sponsoring Organisations, August 1999. http://csrc.nist.gov/cc/CC-v2.1.html.
-
(1999)
Common criteria for information technology security evaluation.
-
-
-
32
-
-
34547468412
-
Towards an open, trusted digital rights management platform
-
ACM Press
-
A. Cooper and A. Martin. Towards an open, trusted digital rights management platform. In Proceedings of the ACM Workshop on Digital Rights Management (DRM’06), Alexandria, Virginia, October 30, 2006, pages 79-88. ACM Press, 2006.
-
(2006)
Proceedings of the ACM Workshop on Digital Rights Management (DRM’06), Alexandria, Virginia, October 30, 2006
, pp. 79-88
-
-
Cooper, A.1
Martin, A.2
-
35
-
-
70350686777
-
Implementation aspects of mobile and embedded trusted computing
-
L. Chen, C. J. Mitchell, and A. Martin, editors, Springer-Verlag
-
K. Dietrich and J. Winter. Implementation aspects of mobile and embedded trusted computing. In L. Chen, C. J. Mitchell, and A. Martin, editors, Trusted Computing, Second International Conference, Trust 2009, Oxford, U.K., April 6-8, 2009, Proceedings, volume 5471 of Lecture Notes in Computer Science, pages 29-44. Springer-Verlag, 2009.
-
(2009)
Trusted Computing, Second International Conference, Trust 2009, Oxford, U.K., April 6-8, 2009, Proceedings, volume 5471 of Lecture Notes in Computer Science
, pp. 29-44
-
-
Dietrich, K.1
Winter, J.2
-
36
-
-
0035474388
-
Building the IBM 4758 Secure Coprocessor
-
J. Dyer, M. Lindemann, R. Perez, R. Sailer, L. van Doorn, S. W. Smith, and S. Weingart. Building the IBM 4758 Secure Coprocessor. IEEEC, 34(10):57-66, 2001.
-
(2001)
IEEEC
, vol.34
, Issue.10
, pp. 57-66
-
-
Dyer, J.1
Lindemann, M.2
Perez, R.3
Sailer, R.4
van Doorn, L.5
Smith, S.W.6
Weingart, S.7
-
37
-
-
79959557051
-
Reconfigurable trusted computing in hardware
-
ACM Press
-
T. Eisenbarth, T. Gneysu, C. Paar, A.-R. Sadeghi, D. Schellekens, and M. Wolf. Reconfigurable trusted computing in hardware. In STC’07-Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, Alexandria, Virginia, November 2, 2007, pages 15-20. ACM Press, 2007.
-
(2007)
STC’07-Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, Alexandria, Virginia, November 2, 2007
, pp. 15-20
-
-
Eisenbarth, T.1
Gneysu, T.2
Paar, C.3
Sadeghi, A.-R.4
Schellekens, D.5
Wolf, M.6
-
39
-
-
70350647620
-
Toward a Programmable TPM
-
L. Chen, C. J. Mitchell, and A. Martin, editors, Springer-Verlag
-
P. England and T. Tariq. Toward a Programmable TPM. In L. Chen, C. J. Mitchell, and A. Martin, editors, Trusted Computing, Second International Conference, Trust 2009, Oxford, U.K., April 6-8, 2009, Proceedings, volume 5471 of Lecture Notes in Computer Science, pages 1-13. Springer-Verlag, 2009.
-
(2009)
Trusted Computing, Second International Conference, Trust 2009, Oxford, U.K., April 6-8, 2009, Proceedings, volume 5471 of Lecture Notes in Computer Science
, pp. 1-13
-
-
England, P.1
Tariq, T.2
-
40
-
-
85054423915
-
-
European Multilaterally Secure Computing Base (EMSCB). http://www.emscb.org.
-
-
-
-
41
-
-
3042699012
-
Understanding Trusted Computing-Will Its Benefits Outweigh Its Drawbacks?
-
May/June
-
E. W. Felten. Understanding Trusted Computing-Will Its Benefits Outweigh Its Drawbacks? IEEE Security and Privacy, pages 60-62, May/June 2003.
-
(2003)
IEEE Security and Privacy
, pp. 60-62
-
-
Felten, E.W.1
-
45
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
M. L. Scott and L. L. Peterson, editors, Bolton Landing, NY, October 19-22
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: a virtual machine-based platform for trusted computing. In M. L. Scott and L. L. Peterson, editors, Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, SOSP 2003, Bolton Landing, NY, October 19-22, 2003, pages 193-206.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, SOSP 2003
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
46
-
-
79952612270
-
Beyond secure channels
-
P. Ning, V. Atluri, S. Xu, and M. Yung, editors, Alexandria, VA, November 2
-
Y. Gasmi, A.-R. Sadeghi, P. Stewin, M. Unger, and N. Asokan. Beyond secure channels. In P. Ning, V. Atluri, S. Xu, and M. Yung, editors, Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, November 2, 2007.
-
(2007)
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007
-
-
Gasmi, Y.1
Sadeghi, A.-R.2
Stewin, P.3
Unger, M.4
Asokan, N.5
-
47
-
-
70349233094
-
Flexible and secure enterprise rights management based on trusted virtual domains
-
ACM
-
Y. Gasmi, A.-R. Sadeghi, P. Stewin, M. Unger, M. Winandy, R. Husseiki, and C. Stüble. Flexible and secure enterprise rights management based on trusted virtual domains. In Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, October 31, 2008, pages 71-80. ACM, 2008.
-
(2008)
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, October 31, 2008
, pp. 71-80
-
-
Gasmi, Y.1
Sadeghi, A.-R.2
Stewin, P.3
Unger, M.4
Winandy, M.5
Husseiki, R.6
Stüble, C.7
-
48
-
-
0038341105
-
Silicon physical random functions
-
ACM Press
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas. Silicon physical random functions. In Proceedings of the 9th ACM Conference on Computer and Communications Security (ACMCCS’02), Washington, D.C., November 18-22, 2002, pages 148-160. ACM Press, 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security (ACMCCS’02), Washington, D.C., November 18-22, 2002
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
van Dijk, M.3
Devadas, S.4
-
49
-
-
51549101299
-
A prototype of trusted platform functionality on reconfigurable hardware for bitstream updates
-
IEEE Computer Society
-
B. Glas, A. Klimm, D. Schwab, K. Muller-Glaser, and J. Becker. A prototype of trusted platform functionality on reconfigurable hardware for bitstream updates. In Proceedings of the 2008 19th IEEE/IFIP International Symposium on Rapid System Prototyping, pages 135-141. IEEE Computer Society, 2008.
-
(2008)
Proceedings of the 2008 19th IEEE/IFIP International Symposium on Rapid System Prototyping
, pp. 135-141
-
-
Glas, B.1
Klimm, A.2
Schwab, D.3
Muller-Glaser, K.4
Becker, J.5
-
51
-
-
34250717227
-
Trusted Virtual Domains: Toward secure distributed services
-
June
-
J. L. Griffin, T. Jaeger, R. Perez, R. Sailer, L. van Doorn, and R. Cáceres. Trusted Virtual Domains: Toward secure distributed services. In Proceedings of the 1st IEEE Workshop on Hot Topics in System Dependability (HotDep’05), June 2005.
-
(2005)
Proceedings of the 1st IEEE Workshop on Hot Topics in System Dependability (HotDep’05)
-
-
Griffin, J.L.1
Jaeger, T.2
Perez, R.3
Sailer, R.4
van Doorn, L.5
Cáceres, R.6
-
52
-
-
38049069294
-
Security evaluation of scenarios based on the TCG TPM specification
-
J. Biskup and J. Lopez, editors
-
S. Gürgens, C. Rudolph, D. Scheuermann, M. Atts, and R. Plaga. Security evaluation of scenarios based on the TCG TPM specification. In J. Biskup and J. Lopez, editors, Computer Security-ESORICS 2007, 12th European Symposium on Research in Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings. Lecture Notes in Computer Science, page 4734, 2007.
-
(2007)
Computer Security-ESORICS 2007, 12th European Symposium on Research in Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings. Lecture Notes in Computer Science
, pp. 4734
-
-
Gürgens, S.1
Rudolph, C.2
Scheuermann, D.3
Atts, M.4
Plaga, R.5
-
53
-
-
24644470511
-
Semantic remote attestation: A virtual machine directed approach to trusted computing
-
May 2004, also Technical 03-20, School of Information and Computer Science, University of California, Irvine, October
-
V. Haldar, D. Chandra, and M. Franz. Semantic remote attestation: A virtual machine directed approach to trusted computing. In USENIX Virtual Machine Research and Technology Symposium, May 2004, also Technical Report No. 03-20, School of Information and Computer Science, University of California, Irvine, October 2003.
-
(2003)
USENIX Virtual Machine Research and Technology Symposium
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
55
-
-
24944584954
-
-
Technical Report 252491-001, Intel Corporation, September
-
Intel. Lagrande technology architectural overview. Technical Report 252491-001, Intel Corporation, September 2003.
-
(2003)
Lagrande technology architectural overview
-
-
-
56
-
-
84958776015
-
Personal secure booting
-
V. Varadharajan and Y. Mu, editors, Springer-Verlag
-
N. Itoi, W. A. Arbaugh, S. J. Pollack, and D. M. Reeves. Personal secure booting. In V. Varadharajan and Y. Mu, editors, Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13 2001, Proceedings, volume 2119 of Lecture Notes in Computer Science, pages 130-144. Springer-Verlag, 2002.
-
(2002)
Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13 2001, Proceedings, volume 2119 of Lecture Notes in Computer Science
, pp. 130-144
-
-
Itoi, N.1
Arbaugh, W.A.2
Pollack, S.J.3
Reeves, D.M.4
-
58
-
-
84942771624
-
Privacy and trusted computing
-
IEEE Computer Society
-
J. Reid, J. M. Gonzales Nieto, E. Dawson, and E. Okamoto. Privacy and trusted computing. In 14th International Workshop on Database and Expert Systems Applications (DEXA’03), September 1-5, 2003, Prague, Czech Republic, pages 383-388. IEEE Computer Society, 2003.
-
(2003)
14th International Workshop on Database and Expert Systems Applications (DEXA’03), September 1-5, 2003, Prague, Czech Republic
, pp. 383-388
-
-
Reid, J.1
Gonzales Nieto, J.M.2
Dawson, E.3
Okamoto, E.4
-
59
-
-
71749111380
-
Towards multi-layer trusted virtual domains
-
Tokyo, Japan, November, Japanese Ministry of Economy, Trade and Industry (METI)
-
Y. Katsuno, M. Kudo, R. Perez, and R. Sailer. Towards multi-layer trusted virtual domains. In 2nd Workshop on Advances in Trusted Computing (WATC 2006 Fall), Tokyo, Japan, November 2006. Japanese Ministry of Economy, Trade and Industry (METI).
-
(2006)
2nd Workshop on Advances in Trusted Computing (WATC 2006 Fall)
-
-
Katsuno, Y.1
Kudo, M.2
Perez, R.3
Sailer, R.4
-
60
-
-
70350634135
-
Revocation of TPM keys
-
L. Chen, C. J. Mitchell, and A. Martin, editors, Springer-Verlag
-
S. Katzenbeisser, K. Kursawe, and F. Stumpf. Revocation of TPM keys. In L. Chen, C. J. Mitchell, and A. Martin, editors, Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings, volume 5471 of Lecture Notes in Computer Science, pages 120-132. Springer-Verlag, 2009.
-
(2009)
Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings, volume 5471 of Lecture Notes in Computer Science
, pp. 120-132
-
-
Katzenbeisser, S.1
Kursawe, K.2
Stumpf, F.3
-
61
-
-
85077706009
-
OSLO: Improving the security of trusted computing
-
B. Kauer. OSLO: Improving the security of trusted computing. In Proceedings of the 16th USENIX Security Symposium, Boston, MA, August 6-10, 2007, pages 229-237, 2007.
-
(2007)
Proceedings of the 16th USENIX Security Symposium, Boston, MA, August 6-10, 2007
, pp. 229-237
-
-
Kauer, B.1
-
64
-
-
84955566566
-
A privacy-enhanced peer-to-peer reputation system
-
K. Bauknecht, A. M. Tjoa, and G. Quirchmayr, editors, Springer-Verlag
-
M. Kinateder and S. Pearson. A privacy-enhanced peer-to-peer reputation system. In K. Bauknecht, A. M. Tjoa, and G. Quirchmayr, editors, E-Commerce and Web Technologies, 4th International Conference, EC-Web, Prague, Czech Republic, September 2-5, 2003, Proceedings, volume 2738 of Lecture Notes in Computer Science, pages 206-216. Springer-Verlag, 2003.
-
(2003)
E-Commerce and Web Technologies, 4th International Conference, EC-Web, Prague, Czech Republic, September 2-5, 2003, Proceedings, volume 2738 of Lecture Notes in Computer Science
, pp. 206-216
-
-
Kinateder, M.1
Pearson, S.2
-
65
-
-
51849141354
-
SeReCon: A secure dynamic partial reconfiguration controller
-
IEEE Computer Society
-
K. Kpa, F. Morgan, K. Koeciuszkiewicz, and T. Surmacz. SeReCon: a secure dynamic partial reconfiguration controller. In Symposium on VLSI, 2008. ISVLSI’08. IEEE Computer Society Annual, Montpellier, France, 7-9 April 2008, pages 292-297. IEEE Computer Society, 2008.
-
(2008)
Symposium on VLSI, 2008. ISVLSI’08. IEEE Computer Society Annual, Montpellier, France, 7-9 April 2008
, pp. 292-297
-
-
Kpa, K.1
Morgan, F.2
Koeciuszkiewicz, K.3
Surmacz, T.4
-
66
-
-
27244446779
-
Secure data management in trusted computing
-
J. R. Rao and B. Sunar, editors, Springer
-
U. Kühn, K. Kursawe, S. Lucks, A.-R. Sadeghi, and C. Stüble. Secure data management in trusted computing. In J. R. Rao and B. Sunar, editors, Cryptographic Hardware and Embedded Systems-CHES 2005, 7th International Workshop, Edinburgh, UK, August 29-September 1, 2005, Proceedings. Lecture Notes in Computer Science, page 3659, Springer, 2005.
-
(2005)
Cryptographic Hardware and Embedded Systems-CHES 2005, 7th International Workshop, Edinburgh, UK, August 29-September 1, 2005, Proceedings. Lecture Notes in Computer Science
, pp. 3659
-
-
Kühn, U.1
Kursawe, K.2
Lucks, S.3
Sadeghi, A.-R.4
Stüble, C.5
-
67
-
-
79959566693
-
Property-based attestation and sealing with commonly available hard-and software
-
P. Ning, V. Atluri, S. Xu, M. Yung, editors, Alexandria, VA, November 2
-
U. Kühn, M. Selhorst, and C. Stüble. Property-based attestation and sealing with commonly available hard-and software. In P. Ning, V. Atluri, S. Xu, M. Yung, editors, Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, November 2, 2007.
-
(2007)
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007
-
-
Kühn, U.1
Selhorst, M.2
Stüble, C.3
-
68
-
-
74049084273
-
Flexible µTPMs through disembedding
-
ACM Press
-
K. Kursawe and D. Schellekens. Flexible µTPMs through disembedding. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia, pages 116-124. ACM Press, 2009.
-
(2009)
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia
, pp. 116-124
-
-
Kursawe, K.1
Schellekens, D.2
-
70
-
-
70350647626
-
Modeling trusted computing support in a protection proffle for high assurance security kernels
-
L. Chen, C. J. Mitchell, and A. Martin, editors, Springer-Verlag
-
H. Lhr, A.-R. Sadeghi, C. Stble, M. Weber, and M. Winandy. Modeling trusted computing support in a protection proffle for high assurance security kernels. In L. Chen, C. J. Mitchell, and A. Martin, editors, Trusted Computing, Second International Conference, Trust 2009, Oxford, U.K., April 6-8, 2009, Proceedings, volume 5471 of Lecture Notes in Computer Science, pages 45-62. Springer-Verlag, 2009.
-
(2009)
Trusted Computing, Second International Conference, Trust 2009, Oxford, U.K., April 6-8, 2009, Proceedings, volume 5471 of Lecture Notes in Computer Science
, pp. 45-62
-
-
Lhr, H.1
Sadeghi, A.-R.2
Stble, C.3
Weber, M.4
Winandy, M.5
-
71
-
-
70350637714
-
Trusted privacy domains-challenges for trusted computing in privacy-protecting information sharing
-
F. Bao, H. Li, and G. Wang, editors, Springer-Verlag
-
H. Lhr, A.-R. Sadeghi, C. Vishik, and M. Winandy. Trusted privacy domains-challenges for trusted computing in privacy-protecting information sharing. In F. Bao, H. Li, and G. Wang, editors, Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi’an, China, April 13-15, 2009, Proceedings, volume 5451 of Lecture Notes in Computer Science, pages 396-407. Springer-Verlag, 2009.
-
(2009)
Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi’an, China, April 13-15, 2009, Proceedings, volume 5451 of Lecture Notes in Computer Science
, pp. 396-407
-
-
Lhr, H.1
Sadeghi, A.-R.2
Vishik, C.3
Winandy, M.4
-
72
-
-
24644512574
-
Towards real micro-kernels
-
J. Liedtke. Towards real micro-kernels. Commun. ACM, 39(9), 1996.
-
(1996)
Commun. ACM
, vol.39
, Issue.9
-
-
Liedtke, J.1
-
73
-
-
38549133825
-
Enhancing Grid Security Using Trusted Virtualization
-
B. Xiao, L. T. Yang, J. Ma, C. Müller-Schloer, Y. Hua, editors, Springer
-
H. Löhr, H. G. V. Ramasamy, S. Schulz, M. Schunter, and C. Stüble. Enhancing Grid Security Using Trusted Virtualization. In B. Xiao, L. T. Yang, J. Ma, C. Müller-Schloer, Y. Hua, editors, Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, July 11-13, 2007, Proceedings. Lecture Notes in Computer Science, page 4610, Springer 2007.
-
(2007)
Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, July 11-13, 2007, Proceedings. Lecture Notes in Computer Science
, pp. 4610
-
-
Löhr, H.1
Ramasamy, H.G.V.2
Schulz, S.3
Schunter, M.4
Stüble, C.5
-
74
-
-
70350637714
-
Trusted privacy domains-challenges for trusted computing in privacy-protecting information sharing
-
Springer
-
H. Löhr, A.-R. Sadeghi, C. Vishik, and M. Winandy. Trusted privacy domains-challenges for trusted computing in privacy-protecting information sharing. In Information Security Practice and Experience, 5th International Conference, ISPEC 2009, volume 5451 of Lecture Notes in Computer Science, pages 396-407. Springer, 2009.
-
(2009)
Information Security Practice and Experience, 5th International Conference, ISPEC 2009, volume 5451 of Lecture Notes in Computer Science
, pp. 396-407
-
-
Löhr, H.1
Sadeghi, A.-R.2
Vishik, C.3
Winandy, M.4
-
75
-
-
33646445517
-
NGSCB: A trusted open system
-
J. P. H. Wang and V. Varadharajan, editors, Springer-Verlag
-
P. E. M. Peinado, Y. Chen, and J. Manferdelli. NGSCB: A trusted open system. In J. P. H. Wang and V. Varadharajan, editors, Information Security and Privacy, 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15 2004, Proceedings, volume 3108 of Lecture Notes in Computer Science, pages 86-97. Springer-Verlag, 2004.
-
(2004)
Information Security and Privacy, 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15 2004, Proceedings, volume 3108 of Lecture Notes in Computer Science
, pp. 86-97
-
-
Peinado, P.E.M.1
Chen, Y.2
Manferdelli, J.3
-
76
-
-
21644481379
-
-
Technical Report TR2003-471, Department of Computer Science, Dartmouth College
-
R. MacDonald, S. Smith, J. Marchesini, and O. Wild. Bear: An open-source virtual secure coprocessor based on TCPA. Technical Report TR2003-471, Department of Computer Science, Dartmouth College, 2003.
-
(2003)
Bear: An open-source virtual secure coprocessor based on TCPA.
-
-
MacDonald, R.1
Smith, S.2
Marchesini, J.3
Wild, O.4
-
78
-
-
21644454794
-
Open-source applications of TCPA hardware
-
ACM, December
-
J. Marchesini, S. Smith, O. Wild, A. Barsamian, and J. Stabiner. Open-source applications of TCPA hardware. In 20th Annual Computer Security Applications Conference. ACM, December 2004.
-
(2004)
20th Annual Computer Security Applications Conference.
-
-
Marchesini, J.1
Smith, S.2
Wild, O.3
Barsamian, A.4
Stabiner, J.5
-
79
-
-
21644470487
-
-
Technical Report TR2003-476, Department of Computer Science, Dartmouth College
-
J. Marchesini, S. W. Smith, O. Wild, and R. MacDonald. Experimenting with TCPA/TCG hardware, or: How I learned to stop worrying and love the bear. Technical Report TR2003-476, Department of Computer Science, Dartmouth College, 2003.
-
(2003)
Experimenting with TCPA/TCG hardware, or: How I learned to stop worrying and love the bear.
-
-
Marchesini, J.1
Smith, S.W.2
Wild, O.3
MacDonald, R.4
-
81
-
-
85054455073
-
Mobile security and trusted computing
-
C. J. Mitchell. Mobile security and trusted computing. it-Information Technology, 48:321-326, 2006.
-
(2006)
It-Information Technology
, vol.48
, pp. 321-326
-
-
Mitchell, C.J.1
-
82
-
-
27244449284
-
-
Technical report, Microsoft Corporation, October
-
C. Mundie, P. de Vries, P. Haynes, and M. Corwine. Microsoft whitepaper on trustworthy computing. Technical report, Microsoft Corporation, October 2002.
-
(2002)
Microsoft whitepaper on trustworthy computing.
-
-
Mundie, C.1
de Vries, P.2
Haynes, P.3
Corwine, M.4
-
83
-
-
85054442252
-
-
Open Trusted Computing (OTC). http://www.opentc.net.
-
-
-
-
84
-
-
17444421583
-
Does trusted computing remedy computer security problems?
-
March
-
R. Oppliger and R. Rytz. Does trusted computing remedy computer security problems? IEEE Security & Privacy, 3(2):16-19, March 2005.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.2
, pp. 16-19
-
-
Oppliger, R.1
Rytz, R.2
-
85
-
-
41549099706
-
Securing peer-topeer distributions for mobile devices
-
L. Chen, Y. Mu, and W. Susilo, editors, Springer-Verlag
-
A. Osterhues, A.-R. Sadeghi, M. Wolf, C. Stble, and N. Asokan. Securing peer-topeer distributions for mobile devices. In L. Chen, Y. Mu, and W. Susilo, editors, Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, volume 4991 of Lecture Notes in Computer Science, pages 161-175. Springer-Verlag, 2008.
-
(2008)
Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, volume 4991 of Lecture Notes in Computer Science
, pp. 161-175
-
-
Osterhues, A.1
Sadeghi, A.-R.2
Wolf, M.3
Stble, C.4
Asokan, N.5
-
86
-
-
0037144430
-
Physical one-way functions
-
September
-
R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld. Physical one-way functions. Science, 297(5589):2026-2030, September 2002.
-
(2002)
Science
, vol.297
, Issue.5589
, pp. 2026-2030
-
-
Pappu, R.1
Recht, B.2
Taylor, J.3
Gershenfeld, N.4
-
87
-
-
35048827792
-
Single sign-on using trusted platforms
-
C. Boyd and W. Mao, editors, Springer-Verlag
-
A. Pashalidis and C. J. Mitchell. Single sign-on using trusted platforms. In C. Boyd and W. Mao, editors, Information Security, 6th International Conference, ISC 2003, Bristol, U.K., October 1-3, 2003, Proceedings, volume 2851 of Lecture Notes in Computer Science, pages 54-68. Springer-Verlag, 2003.
-
(2003)
Information Security, 6th International Conference, ISC 2003, Bristol, U.K., October 1-3, 2003, Proceedings, volume 2851 of Lecture Notes in Computer Science
, pp. 54-68
-
-
Pashalidis, A.1
Mitchell, C.J.2
-
90
-
-
85054452005
-
-
Technical Report RZ 3335 (#93381), IBM Research Division, Zurich Laboratory, April
-
B. Pfitzmann, J. Riordan, C. Stüble, M. Waidner, and A. Weber. The PERSEUS system architecture. Technical Report RZ 3335 (#93381), IBM Research Division, Zurich Laboratory, April 2001.
-
(2001)
The PERSEUS system architecture.
-
-
Pfitzmann, B.1
Riordan, J.2
Stüble, C.3
Waidner, M.4
Weber, A.5
-
91
-
-
85054463430
-
A privacy-CA for anonymity and trust
-
L. Chen, C. J. Mitchell, and A. Martin, editors, Springer-Verlag
-
M. Pirker, R. Toegl, D. Hein, and P. Danner. A privacy-CA for anonymity and trust. In L. Chen, C. J. Mitchell, and A. Martin, editors, Trusted Computing, Second International Conference, Trust 2009, Oxford, U.K., April 6-8, 2009, Proceedings, volume 5471 of Lecture Notes in Computer Science, pages 29-44. Springer-Verlag, 2009.
-
(2009)
Trusted Computing, Second International Conference, Trust 2009, Oxford, U.K., April 6-8, 2009, Proceedings, volume 5471 of Lecture Notes in Computer Science
, pp. 29-44
-
-
Pirker, M.1
Toegl, R.2
Hein, D.3
Danner, P.4
-
92
-
-
24644439462
-
-
Technical Report RZ 3548, IBM Research, May
-
J. Poritz, M. Schunter, E. Van Herreweghen, and M. Waidner. Property attestation-scalable and privacy-friendly security assessment of peer computers. Technical Report RZ 3548, IBM Research, May 2004.
-
(2004)
Property attestation-scalable and privacy-friendly security assessment of peer computers.
-
-
Poritz, J.1
Schunter, M.2
Van Herreweghen, E.3
Waidner, M.4
-
93
-
-
0342559231
-
-
RFC 2866 (Informational), June, Updated by RFCs 2867
-
C. Rigney. RADIUS Accounting. RFC 2866 (Informational), June 2000. Updated by RFCs 2867, 5080.
-
(2000)
RADIUS Accounting.
, pp. 5080
-
-
Rigney, C.1
-
94
-
-
85054464868
-
-
RFC 2865 (Draft Standard), June 2000. Updated by RFCs 2868
-
C. Rigney, S. Willens, A. Rubens, and W. Simpson. Remote Authentication Dial In User Service (RADIUS). RFC 2865 (Draft Standard), June 2000. Updated by RFCs 2868, 3575, 5080.
-
Remote Authentication Dial In User Service (RADIUS).
, vol.3575
, pp. 5080
-
-
Rigney, C.1
Willens, S.2
Rubens, A.3
Simpson, W.4
-
96
-
-
36248950111
-
Covert identity information in direct anonymous attestation (daa)
-
Springer-Verlag
-
C. Rudolph. Covert identity information in direct anonymous attestation (daa). In New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, volume 232 of IFIP International Federation for Information Processing, pages 443-448. Springer-Verlag, 2007.
-
(2007)
New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, volume 232 of IFIP International Federation for Information Processing
, pp. 443-448
-
-
Rudolph, C.1
-
97
-
-
34547208096
-
TCG Inside?-A Note on TPM Specification Compliance
-
A. Juels, G. Tsudik, S. Xu, and M. Yung, editors, Alexandria, VA, November 3
-
A.-R. Sadeghi, M. Selhorst, C. Christian Stüble, C. Wachsmann, and M. Winandy. TCG Inside?-A Note on TPM Specification Compliance. In A. Juels, G. Tsudik, S. Xu, and M. Yung, editors, Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, November 3, 2006.
-
(2006)
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006
-
-
Sadeghi, A.-R.1
Selhorst, M.2
Christian Stüble, C.3
Wachsmann, C.4
Winandy, M.5
-
98
-
-
56649102115
-
Property-based tpm virtualization
-
T-C. Wu, C.-L. Lei, V. Rijmen, and D.-T. Lee, editors, Springer-Verlag
-
A.-R. Sadeghi, C. Stble, and M. Winandy. Property-based tpm virtualization. In T-C. Wu, C.-L. Lei, V. Rijmen, and D.-T. Lee, editors, Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008, Proceedings, volume 5222 of Lecture Notes in Computer Science, pages 1-16. Springer-Verlag, 2008.
-
(2008)
Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008, Proceedings, volume 5222 of Lecture Notes in Computer Science
, pp. 1-16
-
-
Sadeghi, A.-R.1
Stble, C.2
Winandy, M.3
-
99
-
-
29244472125
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
Virginia Beach, VA, September, ACM SIGSAC, ACM Press
-
A.-R. Sadeghi and C. Stüble. Property-based attestation for computing platforms:Caring about properties, not mechanisms. In 2004 New Security Paradigms Workshop, Virginia Beach, VA, September 2004. ACM SIGSAC, ACM Press.
-
(2004)
2004 New Security Paradigms Workshop
-
-
Sadeghi, A.-R.1
Stüble, C.2
-
100
-
-
12244250631
-
-
White paper, IBM Research, October
-
D. Safford. The need for TCPA. White paper, IBM Research, October 2002.
-
(2002)
The need for TCPA.
-
-
Safford, D.1
-
101
-
-
33750248123
-
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor
-
5-9 December 2005, Tucson, AZ, IEEE Computer Society
-
R. Sailer, T. Jaeger, E. Valdez, R. Caceres, R. Perez, S. Berger, J. L. Griffin, and L. van Doorn. Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor, 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, IEEE Computer Society, 2005, pages 276-285.
-
(2005)
21st Annual Computer Security Applications Conference (ACSAC 2005)
, pp. 276-285
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Caceres, R.4
Perez, R.5
Berger, S.6
Griffin, J.L.7
van Doorn, L.8
-
102
-
-
51949119355
-
-
Technical Report RC23511, IBM Research Division, February
-
R. Sailer, E. Valdez, T. Jaeger, R. Perez, L. van Doorn, J. L. Griffin, and S. Berger. sHype: Secure hypervisor approach to trusted virtualized systems. Technical Report RC23511, IBM Research Division, February 2005.
-
(2005)
Shype: Secure hypervisor approach to trusted virtualized systems.
-
-
Sailer, R.1
Valdez, E.2
Jaeger, T.3
Perez, R.4
van Doorn, L.5
Griffin, J.L.6
Berger, S.7
-
103
-
-
85084162270
-
-
Research Report RC23064, IBM Research, January
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. Research Report RC23064, IBM Research, January 2004.
-
(2004)
Design and implementation of a TCG-based integrity measurement architecture.
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
van Doorn, L.4
-
104
-
-
30144435491
-
Peer-to-peer access control architecture using trusted computing technology
-
E. Ferrari and G.-J. Ahn, editors, ACM Press
-
R. Sandhu and X. Zhang. Peer-to-peer access control architecture using trusted computing technology. In E. Ferrari and G.-J. Ahn, editors, Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, June 1-3, 2005, Stockholm, Sweden, pages 147-158. ACM Press, 2005.
-
(2005)
Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, June 1-3, 2005, Stockholm, Sweden
, pp. 147-158
-
-
Sandhu, R.1
Zhang, X.2
-
105
-
-
34547182340
-
Virtual monotonic counters and count-limited objects using a TPM without a trusted os
-
ACM Press
-
L. F. G. Sarmenta, M. van Dijk, C. W. O’Donnell, J. Rhodes, and S. Devadas. Virtual monotonic counters and count-limited objects using a TPM without a trusted os. In STC '06: Proceedings of the First ACM Workshop on Scalable Trusted Computing, pages 27-42. ACM Press, 2006.
-
(2006)
STC '06: Proceedings of the First ACM Workshop on Scalable Trusted Computing
, pp. 27-42
-
-
Sarmenta, L.F.G.1
van Dijk, M.2
O’Donnell, C.W.3
Rhodes, J.4
Devadas, S.5
-
106
-
-
38049010839
-
Trusted computing, peer-to-peer distribution, and the economics of pirated entertainment
-
S. E. Schechter, R. A. Greenstadt, and M. D. Smith. Trusted computing, peer-to-peer distribution, and the economics of pirated entertainment. In Proceedings of the Second Annual Workshop on Economics and Information Security, 2003, College Park, MD, May 29-30, 2003.
-
(2003)
Proceedings of the Second Annual Workshop on Economics and Information Security, 2003, College Park, MD, May 29-30
-
-
Schechter, S.E.1
Greenstadt, R.A.2
Smith, M.D.3
-
107
-
-
54249119216
-
Embedded trusted computing with authenticated non-volatile memory
-
P. Lipp, A.-R. Sadeghi, and K.-M. Koch, editors, Springer-Verlag
-
D. Schellekens, P. Tuyls, and B. Preneel. Embedded trusted computing with authenticated non-volatile memory. In P. Lipp, A.-R. Sadeghi, and K.-M. Koch, editors, Trusted Computing-Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings, volume 4968 of Lecture Notes in Computer Science, pages 60-74. Springer-Verlag, 2008.
-
(2008)
Trusted Computing-Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings, volume 4968 of Lecture Notes in Computer Science
, pp. 60-74
-
-
Schellekens, D.1
Tuyls, P.2
Preneel, B.3
-
108
-
-
85054445778
-
-
Palladium details
-
S. Schoen. Palladium details. http://www.activewin.com/articles/2002/pd. shtml, 2002.
-
(2002)
-
-
Schoen, S.1
-
109
-
-
70350635837
-
Secure VPNs for trusted computing environments
-
L. Chen, C. J. Mitchell, and A. Martin, editors, Springer-Verlag
-
S. Schulz and A.-R. Sadeghi. Secure VPNs for trusted computing environments. In L. Chen, C. J. Mitchell, and A. Martin, editors, Trusted Computing, Second International Conference, Trust 2009, Oxford, U.K., April 6-8, 2009, Proceedings, volume 5471 of Lecture Notes in Computer Science, pages 197-216. Springer-Verlag, 2009.
-
(2009)
Trusted Computing, Second International Conference, Trust 2009, Oxford, U.K., April 6-8, 2009, Proceedings, volume 5471 of Lecture Notes in Computer Science
, pp. 197-216
-
-
Schulz, S.1
Sadeghi, A.-R.2
-
110
-
-
84956968842
-
Outbound authentication for programmable secure coprocessors
-
D. Gollmann, G. Karjoth, and M. Waidner, editors, Zurich, Switzerland, October, Springer-Verlag, Berlin
-
S. W. Smith. Outbound authentication for programmable secure coprocessors. In D. Gollmann, G. Karjoth, and M. Waidner, editors, Proceedings of the Seventh European Symposium on Research in Computer Security (ESORICS), volume 2502 of Lecture Notes in Computer Science, pages 72-89, Zurich, Switzerland, October 2002. Springer-Verlag, Berlin.
-
(2002)
Proceedings of the Seventh European Symposium on Research in Computer Security (ESORICS), volume 2502 of Lecture Notes in Computer Science
, pp. 72-89
-
-
Smith, S.W.1
-
111
-
-
38149070279
-
Direct anonymous attestation: Ensuring privacy with corrupt administrators
-
F. Stajano, C. Meadows, S. Capkun, and T. Moore, editors, Springer-Verlag
-
B. Smyth, L. Chen, and M. D. Ryan. Direct anonymous attestation: Ensuring privacy with corrupt administrators. In F. Stajano, C. Meadows, S. Capkun, and T. Moore, editors, Procedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks, volume 4572 of Lecture Notes in Computer Science, pages 218-231. Springer-Verlag, 2007.
-
(2007)
Procedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks, volume 4572 of Lecture Notes in Computer Science
, pp. 218-231
-
-
Smyth, B.1
Chen, L.2
Ryan, M.D.3
-
112
-
-
85054444188
-
-
Risks Digest 19.37, September
-
G. Spafford. Risks Digest 19.37, September 1997. http://catless.ncl.ac.uk/Risks/19.37.html.
-
(1997)
-
-
Spafford, G.1
-
113
-
-
84904269073
-
Protecting the creation of digital signatures with trusted computing platform technology against attacks by trojan horse programs
-
M. Dupuy and P. Paradinas, editors, Kluwer Academic Publishers
-
A. Spalka, A. B. Cremers, and H. Langweg. Protecting the creation of digital signatures with trusted computing platform technology against attacks by trojan horse programs. In M. Dupuy and P. Paradinas, editors, Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on Information Security (IFIP/Sec’01), June 11-13, 2001, Paris, France, volume 193 of IFIP Conference Proceedings, pages 403-419. Kluwer Academic Publishers, 2001.
-
(2001)
Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on Information Security (IFIP/Sec’01), June 11-13, 2001, Paris, France, volume 193 of IFIP Conference Proceedings
, pp. 403-419
-
-
Spalka, A.1
Cremers, A.B.2
Langweg, H.3
-
114
-
-
43649103310
-
-
Computer Science Technical Report TR2007-597, Department of Computer Science, Dartmouth College
-
E. R. Sparks. A security assessment of trusted platform modules. Computer Science Technical Report TR2007-597, Department of Computer Science, Dartmouth College, 2007.
-
(2007)
A security assessment of trusted platform modules.
-
-
Sparks, E.R.1
-
115
-
-
49049114336
-
Towards secure e-commerce based on virtualization and attestation techniques
-
March 4-7, 2008, Technical University of Catalonia, Barcelona, Spain, IEEE Computer Society
-
F. Stumpf, C. Eckert, and S. Balfe. Towards secure e-commerce based on virtualization and attestation techniques. In Proceedings of the 3rd International Conference on Availability, Reliability and Security (ARES 2008) March 4-7, 2008, Technical University of Catalonia, Barcelona, Spain, IEEE Computer Society 2008.
-
(2008)
Proceedings of the 3rd International Conference on Availability, Reliability and Security (ARES 2008)
-
-
Stumpf, F.1
Eckert, C.2
Balfe, S.3
-
117
-
-
85054426410
-
-
Trusted Computing Group (TCG). http://www.trustedcomputinggroup.org.
-
-
-
-
119
-
-
80051911759
-
-
May
-
Trusted Computing Group (TCG). Mobile Trusted Module (MTM) Specification. http://www.trustedcomputinggroup.org/developers/mobile/specifications, May 2009.
-
(2009)
Mobile Trusted Module (MTM) Specification
-
-
-
120
-
-
77954740361
-
-
Trusted Computing Group, May
-
Trusted Computing Group (TCG). TPM Main Specification. Trusted Computing Group, May 2009.
-
(2009)
TPM Main Specification
-
-
-
122
-
-
85054424254
-
-
Main Specification, February, Version 1.1b
-
Trusted Computing Platform Alliance (TCPA). Main Specification, February 2002. Version 1.1b.
-
(2002)
-
-
-
123
-
-
34547674038
-
Secret key generation from classical physics
-
S. Mukherjee, E. Aarts, R. Roovers, F. Widdershoven, and M. Ouwerkerk, editors, Philips Research Book Series
-
P. Tuyls and B. Škoriç. Secret key generation from classical physics. In S. Mukherjee, E. Aarts, R. Roovers, F. Widdershoven, and M. Ouwerkerk, editors Amlware: Hardware Technology Drivers of Ambient Intelligence Series, Philips Research Book Series, Vol. 5, 2006.
-
(2006)
Amlware: Hardware Technology Drivers of Ambient Intelligence Series
, vol.5
-
-
Tuyls, P.1
Škoriç, B.2
-
124
-
-
33646754186
-
Finding collisions in the full sha-1
-
V. Shoup, editor, Springer-Verlag
-
Y. L. Y. X. Wang and X. Yu. Finding collisions in the full sha-1. In V. Shoup, editor, Advances in Cryptology-CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, August 14-18, 2005, Proceedings, volume 3621 of Lecture Notes in Computer Science, pages 17-36. Springer-Verlag, 2005.
-
(2005)
Advances in Cryptology-CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, August 14-18, 2005, Proceedings, volume 3621 of Lecture Notes in Computer Science
, pp. 17-36
-
-
Wang, Y.L.Y.X.1
Yu, X.2
-
126
-
-
0004196480
-
-
Ph.D. thesis, School of Computer Science, Carnegie Mellon University, May 1994. CMU-CS-94-149
-
B. S. Yee. Using Secure Coprocessors. Ph.D. thesis, School of Computer Science, Carnegie Mellon University, May 1994. CMU-CS-94-149.
-
Using Secure Coprocessors.
-
-
Yee, B.S.1
|