메뉴 건너뛰기




Volumn , Issue , 2010, Pages 221-256

Trusted computing

Author keywords

[No Author keywords available]

Indexed keywords

GOVERNMENT DATA PROCESSING; INFORMATION SERVICES;

EID: 84930265365     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1201/9781420059823     Document Type: Chapter
Times cited : (2)

References (126)
  • 5
    • 0030672130 scopus 로고    scopus 로고
    • A secure and reliable bootstrap architecture
    • Oakland, CA, May, IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press
    • W. A. Arbaugh, D. J. Farber, and J. M. Smith. A secure and reliable bootstrap architecture. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 65-71, Oakland, CA, May 1997. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press.
    • (1997) Proceedings of the IEEE Symposium on Research in Security and Privacy , pp. 65-71
    • Arbaugh, W.A.1    Farber, D.J.2    Smith, J.M.3
  • 10
    • 85013594843 scopus 로고    scopus 로고
    • Securing peer-to-peer networks using trusted computing
    • C. J. Mitchell, editor, IEEE Press
    • S. Balfe, A. D. Lakhani, and K. G. Paterson. Securing peer-to-peer networks using trusted computing. In C. J. Mitchell, editor, Trusted Computing, pages 271-298. IEEE Press, 2005.
    • (2005) Trusted Computing , pp. 271-298
    • Balfe, S.1    Lakhani, A.D.2    Paterson, K.G.3
  • 19
    • 85054459681 scopus 로고    scopus 로고
    • May
    • Bundesamt fr Sicherheit in der Informationstechnik (BSI). Sichere Inter-Netzwerk Architektur (SINA). http://www.bsi.de/fachthem/sina/, May 2009.
    • (2009) Sichere Inter-Netzwerk Architektur (SINA)
  • 30
    • 85054438403 scopus 로고    scopus 로고
    • Offline dictionary attack on TCG TPM weak authorization data, and solution
    • D. Grawrock, H. Reimer, A.-R. Sadeghi, and C. Vishik, editors, Vieweg & Teubner
    • L. Chen and M. D. Ryan. Offline dictionary attack on TCG TPM weak authorization data, and solution. In D. Grawrock, H. Reimer, A.-R. Sadeghi, and C. Vishik, editors, Future of Trust in Computing. Vieweg & Teubner, 2008.
    • (2008) Future of Trust in Computing.
    • Chen, L.1    Ryan, M.D.2
  • 31
    • 0003765587 scopus 로고    scopus 로고
    • Norm Version 2.1, CCIMB-99-031-33, Common Criteria Project Sponsoring Organisations, August
    • Common Criteria Project Sponsoring Organisations. Common criteria for information technology security evaluation. Norm Version 2.1, CCIMB-99-031-33, Common Criteria Project Sponsoring Organisations, August 1999. http://csrc.nist.gov/cc/CC-v2.1.html.
    • (1999) Common criteria for information technology security evaluation.
  • 40
    • 85054423915 scopus 로고    scopus 로고
    • European Multilaterally Secure Computing Base (EMSCB). http://www.emscb.org.
  • 41
    • 3042699012 scopus 로고    scopus 로고
    • Understanding Trusted Computing-Will Its Benefits Outweigh Its Drawbacks?
    • May/June
    • E. W. Felten. Understanding Trusted Computing-Will Its Benefits Outweigh Its Drawbacks? IEEE Security and Privacy, pages 60-62, May/June 2003.
    • (2003) IEEE Security and Privacy , pp. 60-62
    • Felten, E.W.1
  • 53
    • 24644470511 scopus 로고    scopus 로고
    • Semantic remote attestation: A virtual machine directed approach to trusted computing
    • May 2004, also Technical 03-20, School of Information and Computer Science, University of California, Irvine, October
    • V. Haldar, D. Chandra, and M. Franz. Semantic remote attestation: A virtual machine directed approach to trusted computing. In USENIX Virtual Machine Research and Technology Symposium, May 2004, also Technical Report No. 03-20, School of Information and Computer Science, University of California, Irvine, October 2003.
    • (2003) USENIX Virtual Machine Research and Technology Symposium
    • Haldar, V.1    Chandra, D.2    Franz, M.3
  • 55
    • 24944584954 scopus 로고    scopus 로고
    • Technical Report 252491-001, Intel Corporation, September
    • Intel. Lagrande technology architectural overview. Technical Report 252491-001, Intel Corporation, September 2003.
    • (2003) Lagrande technology architectural overview
  • 67
    • 79959566693 scopus 로고    scopus 로고
    • Property-based attestation and sealing with commonly available hard-and software
    • P. Ning, V. Atluri, S. Xu, M. Yung, editors, Alexandria, VA, November 2
    • U. Kühn, M. Selhorst, and C. Stüble. Property-based attestation and sealing with commonly available hard-and software. In P. Ning, V. Atluri, S. Xu, M. Yung, editors, Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, November 2, 2007.
    • (2007) Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007
    • Kühn, U.1    Selhorst, M.2    Stüble, C.3
  • 72
    • 24644512574 scopus 로고    scopus 로고
    • Towards real micro-kernels
    • J. Liedtke. Towards real micro-kernels. Commun. ACM, 39(9), 1996.
    • (1996) Commun. ACM , vol.39 , Issue.9
    • Liedtke, J.1
  • 81
    • 85054455073 scopus 로고    scopus 로고
    • Mobile security and trusted computing
    • C. J. Mitchell. Mobile security and trusted computing. it-Information Technology, 48:321-326, 2006.
    • (2006) It-Information Technology , vol.48 , pp. 321-326
    • Mitchell, C.J.1
  • 83
    • 85054442252 scopus 로고    scopus 로고
    • Open Trusted Computing (OTC). http://www.opentc.net.
  • 84
    • 17444421583 scopus 로고    scopus 로고
    • Does trusted computing remedy computer security problems?
    • March
    • R. Oppliger and R. Rytz. Does trusted computing remedy computer security problems? IEEE Security & Privacy, 3(2):16-19, March 2005.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.2 , pp. 16-19
    • Oppliger, R.1    Rytz, R.2
  • 86
    • 0037144430 scopus 로고    scopus 로고
    • Physical one-way functions
    • September
    • R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld. Physical one-way functions. Science, 297(5589):2026-2030, September 2002.
    • (2002) Science , vol.297 , Issue.5589 , pp. 2026-2030
    • Pappu, R.1    Recht, B.2    Taylor, J.3    Gershenfeld, N.4
  • 93
    • 0342559231 scopus 로고    scopus 로고
    • RFC 2866 (Informational), June, Updated by RFCs 2867
    • C. Rigney. RADIUS Accounting. RFC 2866 (Informational), June 2000. Updated by RFCs 2867, 5080.
    • (2000) RADIUS Accounting. , pp. 5080
    • Rigney, C.1
  • 99
    • 29244472125 scopus 로고    scopus 로고
    • Property-based attestation for computing platforms: Caring about properties, not mechanisms
    • Virginia Beach, VA, September, ACM SIGSAC, ACM Press
    • A.-R. Sadeghi and C. Stüble. Property-based attestation for computing platforms:Caring about properties, not mechanisms. In 2004 New Security Paradigms Workshop, Virginia Beach, VA, September 2004. ACM SIGSAC, ACM Press.
    • (2004) 2004 New Security Paradigms Workshop
    • Sadeghi, A.-R.1    Stüble, C.2
  • 100
    • 12244250631 scopus 로고    scopus 로고
    • White paper, IBM Research, October
    • D. Safford. The need for TCPA. White paper, IBM Research, October 2002.
    • (2002) The need for TCPA.
    • Safford, D.1
  • 108
    • 85054445778 scopus 로고    scopus 로고
    • Palladium details
    • S. Schoen. Palladium details. http://www.activewin.com/articles/2002/pd. shtml, 2002.
    • (2002)
    • Schoen, S.1
  • 112
    • 85054444188 scopus 로고    scopus 로고
    • Risks Digest 19.37, September
    • G. Spafford. Risks Digest 19.37, September 1997. http://catless.ncl.ac.uk/Risks/19.37.html.
    • (1997)
    • Spafford, G.1
  • 114
    • 43649103310 scopus 로고    scopus 로고
    • Computer Science Technical Report TR2007-597, Department of Computer Science, Dartmouth College
    • E. R. Sparks. A security assessment of trusted platform modules. Computer Science Technical Report TR2007-597, Department of Computer Science, Dartmouth College, 2007.
    • (2007) A security assessment of trusted platform modules.
    • Sparks, E.R.1
  • 117
    • 85054426410 scopus 로고    scopus 로고
    • Trusted Computing Group (TCG). http://www.trustedcomputinggroup.org.
  • 119
    • 80051911759 scopus 로고    scopus 로고
    • May
    • Trusted Computing Group (TCG). Mobile Trusted Module (MTM) Specification. http://www.trustedcomputinggroup.org/developers/mobile/specifications, May 2009.
    • (2009) Mobile Trusted Module (MTM) Specification
  • 120
    • 77954740361 scopus 로고    scopus 로고
    • Trusted Computing Group, May
    • Trusted Computing Group (TCG). TPM Main Specification. Trusted Computing Group, May 2009.
    • (2009) TPM Main Specification
  • 122
    • 85054424254 scopus 로고    scopus 로고
    • Main Specification, February, Version 1.1b
    • Trusted Computing Platform Alliance (TCPA). Main Specification, February 2002. Version 1.1b.
    • (2002)
  • 123
    • 34547674038 scopus 로고    scopus 로고
    • Secret key generation from classical physics
    • S. Mukherjee, E. Aarts, R. Roovers, F. Widdershoven, and M. Ouwerkerk, editors, Philips Research Book Series
    • P. Tuyls and B. Škoriç. Secret key generation from classical physics. In S. Mukherjee, E. Aarts, R. Roovers, F. Widdershoven, and M. Ouwerkerk, editors Amlware: Hardware Technology Drivers of Ambient Intelligence Series, Philips Research Book Series, Vol. 5, 2006.
    • (2006) Amlware: Hardware Technology Drivers of Ambient Intelligence Series , vol.5
    • Tuyls, P.1    Škoriç, B.2
  • 126
    • 0004196480 scopus 로고    scopus 로고
    • Ph.D. thesis, School of Computer Science, Carnegie Mellon University, May 1994. CMU-CS-94-149
    • B. S. Yee. Using Secure Coprocessors. Ph.D. thesis, School of Computer Science, Carnegie Mellon University, May 1994. CMU-CS-94-149.
    • Using Secure Coprocessors.
    • Yee, B.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.