메뉴 건너뛰기




Volumn , Issue , 2005, Pages 11-28

Concepts of trusted computing

(1)  Proudler, G J a  

a NONE

Author keywords

Agent technology; Authorisation; Communication infrastructure; Data authorisation; Data privacy; Secret key; Software agent; Software agents; Ubiquitous computing; Ubiquitous trusted computing

Indexed keywords

ACCESS CONTROL; DATA PRIVACY; SOFTWARE AGENTS; UBIQUITOUS COMPUTING;

EID: 85013596514     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1049/PBPC006E_ch2     Document Type: Chapter
Times cited : (9)

References (5)
  • 1
    • 0030086704 scopus 로고    scopus 로고
    • A hypervisor may be defined as ‘a software layer that implements VMs having the same instruction-set architecture as the hardware upon which the hypervisor executes’: See Bressoud and Schneider
    • Hypervisor-based fault tolerance, February
    • A hypervisor may be defined as ‘a software layer that implements VMs having the same instruction-set architecture as the hardware upon which the hypervisor executes’: See Bressoud and Schneider. Hypervisor-based fault tolerance. ACM Transactions on Computer Systems, 14 (1): 80-107, February 1996.
    • (1996) ACM Transactions on Computer Systems , vol.14 , Issue.1 , pp. 80-107
  • 2
    • 85013593112 scopus 로고    scopus 로고
    • other material) are available at
    • The TCG’s specifications (and other material) are available at www.trustedcomputinggroup. org.
  • 3
    • 85013570891 scopus 로고    scopus 로고
    • Commented by Mr Nate Bohlmann of the Atmel Corporation
    • Commented by Mr Nate Bohlmann of the Atmel Corporation.
  • 4
    • 85013568306 scopus 로고    scopus 로고
    • The technical details of DAA are described in HP’s Technical Report HPL-2004-93, available from
    • One TCG protocol for obtaining platform identities is a zero-knowledge proof called ‘Direct Anonymous Attestation’ (DAA). The technical details of DAA are described in HP’s Technical Report HPL-2004-93, available from www.hpl.hp.com/techreports/2004/HPL-2004-93.html.
  • 5
    • 85013576814 scopus 로고    scopus 로고
    • Some aspects of key migration are described in ‘Migration and maintenance mechanisms
    • S. Pearson ed, Prentice Hall, New York, 2003, ISBN 0-13-009220-7, Chapter 8
    • Some aspects of key migration are described in ‘Migration and maintenance mechanisms’ in S. Pearson ed.: Trusted Computing Platforms - TCPA Technology in Context. Prentice Hall, New York, 2003, ISBN 0-13-009220-7, Chapter 8.
    • Trusted Computing Platforms - TCPA Technology in Context


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.