{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:03:52Z","timestamp":1725465832526},"publisher-location":"Boston","reference-count":10,"publisher":"Kluwer Academic Publishers","isbn-type":[{"type":"print","value":"0387305270"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-31168-8_20","type":"book-chapter","created":{"date-parts":[[2006,6,2]],"date-time":"2006-06-02T19:18:25Z","timestamp":1149275905000},"page":"339-354","source":"Crossref","is-referenced-by-count":0,"title":["Trusted Computing, or the Gatekeeper"],"prefix":"10.1007","author":[{"given":"Klaus","family":"Kursawe","sequence":"first","affiliation":[]},{"given":"Christopher","family":"Wolf","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Hewlett-Packard. 2003. Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall PTR.","key":"20_CR1"},{"unstructured":"Koenig, C., Neumann, A., and Katzschmann, T. 2004. Trusted Computing. Recht und Wirtschaft.","key":"20_CR2"},{"unstructured":"Kursawe, K. and St\u00fcble, C. 2003.. Improving End-user Security and Trustworthiness of TCG-Platforms. Technical report, Saarland University. http:\/\/www-krypt.cs.uni-sb.de\/download\/papers\/KurStu2003.pdf.","key":"20_CR3"},{"unstructured":"Microsoft, 2003. Next Generation Secure Computing Base.. http:\/\/www.microsoft.com\/resources\/ngscb\/default.mspx.","key":"20_CR4"},{"unstructured":"Poritz, J., Schunter, M, Herreweghen, E.V. and Waidner, M. 2004. Property attestation\u2014scalable and privacy-friendly security assessment of peer computers. Technical Report RZ3548, IBM.","key":"20_CR5"},{"unstructured":"Reimer, H., 2004. Schwerpunkt: Trusted computing. Datenschutz und Datensicherheit (DUD), (9).","key":"20_CR6"},{"unstructured":"Sadeghi, A.-R. and St\u00fcble, C. 2004. Property-based attestation for computing platforms: Caring about policies, not mechanisms. In New Security Paradigms Workshop.","key":"20_CR7"},{"unstructured":"Schoen, S., 2004. EFF comments on TCG design, implementation and usage principles. www.eff.org\/Infrastructure\/trusted\\_computing\/20041004\\_eff\\_comments\\_tcg\\_principles.pdf.","key":"20_CR8"},{"issue":"8","key":"20_CR9","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1145\/358198.358210","volume":"27","author":"K. Thompson","year":"1995","unstructured":"Thompson, K. 1995. Reflections on Trusting Trust. Communications of the ACM, 27(8):761\u2013763.","journal-title":"Communications of the ACM"},{"unstructured":"Trusted Computing Group, 2004. TPM Specification version 1.2. https:\/\/www.trustedcomputinggroup.org\/.","key":"20_CR10"}],"container-title":["IFIP International Federation for Information Processing","The Information Society: Emerging Landscapes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-31168-8_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T05:08:51Z","timestamp":1619500131000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-31168-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["0387305270"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/0-387-31168-8_20","relation":{},"subject":[]}}