{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:16:16Z","timestamp":1725560176451},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540282242"},{"type":"electronic","value":"9783540317968"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11537878_32","type":"book-chapter","created":{"date-parts":[[2010,7,19]],"date-time":"2010-07-19T18:07:07Z","timestamp":1279562827000},"page":"321-330","source":"Crossref","is-referenced-by-count":2,"title":["Securing Operating System Services Based on Smart Cards"],"prefix":"10.1007","author":[{"given":"Luigi","family":"Catuogno","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Gassir\u00e0","sequence":"additional","affiliation":[]},{"given":"Michele","family":"Masullo","sequence":"additional","affiliation":[]},{"given":"Ivan","family":"Visconti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","unstructured":"Anderson, R.: TCPA Frequently Asked Questions (2003), http:\/\/www.cl.cam.ac.uk\/users\/rja14\/tcpa-faq.html"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Arbaugh, W., Farber, D., Smith, J.: A Secure and Reliable Bootstrap Architecture. In: Proc. of IEEE Symposium on Security and Privacy 1997, pp. 65\u201371 (1997)","DOI":"10.1109\/SECPRI.1997.601317"},{"key":"32_CR3","volume-title":"CryptoMark: Locking the Stable door ahead of the Trojan Horse","author":"S.M. Beattie","year":"2000","unstructured":"Beattie, S.M., Black, A.P., Cowan, C., Pu, C., Yang, L.P.: CryptoMark: Locking the Stable door ahead of the Trojan Horse. White Paper, WireX Communications Inc (2000)"},{"issue":"5","key":"32_CR4","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1093\/comjnl\/47.5.511","volume":"47","author":"L. Catuogno","year":"2004","unstructured":"Catuogno, L., Visconti, I.: An Architecture for Kernel-Level Verification of Executables at Run Time. The Computer Journal\u00a047(5), 511\u2013526 (2004)","journal-title":"The Computer Journal"},{"key":"32_CR5","volume-title":"Understanding the Linux Kernel","author":"D.P. Bovet","year":"2002","unstructured":"Bovet, D.P., Cesati, M.: Understanding the Linux Kernel, 2nd edn. O\u2019Reilly Associates, Inc., Sebastopol (2002)","edition":"2"},{"key":"32_CR6","unstructured":"Corcoran, D.: PC\/SC lite API version 1.1.1 (1999), http:\/\/www.linuxnet.com"},{"key":"32_CR7","unstructured":"Telekom, D., et al.: Application Independent Card Terminal Application Programming Interface for ICC Applications (1998)"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Gaskell, G., Looi, M.: Integrating Smart Cards Into Authentication Systems. Cryptography: Policy and Algorithms, pp. 270\u2013281 (1995)","DOI":"10.1007\/BFb0032365"},{"key":"32_CR9","unstructured":"The International Organization for Standardization and The International Electrotechnical Commission, ISO\/IEC 7816 parts 1-4: Information technology - Identification cards - Integrated circuit(s) cards with contacts (1995)"},{"key":"32_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/3-540-47719-5_12","volume-title":"Information Security and Privacy","author":"N. Itoi","year":"2001","unstructured":"Itoi, N., Arbaugh, W.A., Pollack, S.J., Reeves, D.M.: Personal secure booting. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol.\u00a02119, pp. 130\u2013144. Springer, Heidelberg (2001)"},{"key":"32_CR11","unstructured":"Itoi, N., Honeyman, P., Rees, J.: SCFS: A UNIX Filesystem for Smartcards. In: Proc. of the First USENIX Workshop on Smartcard Technology, pp. 107\u2013118 (1999)"},{"issue":"9","key":"32_CR12","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"B.C. Neuman","year":"1994","unstructured":"Neuman, B.C., Ts\u2019o, T.: Kerberos: An Authentication Service for Computer Networks. IEEE Communications\u00a032(9), 33\u201338 (1994)","journal-title":"IEEE Communications"},{"key":"32_CR13","first-page":"78","volume-title":"Distributed Open Systems","author":"B. Kohl","year":"1994","unstructured":"Kohl, B., Kohl, B., Neuman, C., T\u2019so, T.Y.: The Evolution of the Kerberos Authentication System. In: Distributed Open Systems, pp. 78\u201394. IEEE Computer Society Press, Los Alamitos (1994)"},{"key":"32_CR14","unstructured":"Microsoft Corporation (2003), Security Model for the Next-Generation Secure Computing Base, http:\/\/www.microsoft.com"},{"key":"32_CR15","unstructured":"MUSCLE (Movement for the use of smart cards in a Linux Environment), http:\/\/www.linuxnet.com"},{"key":"32_CR16","unstructured":"Opencard Consortium, OpenCard Framework, General Information Web Document (1998), http:\/\/www.opencard.org"},{"key":"32_CR17","unstructured":"Patil, S., Kashyap, A., Sivathanu, G., Zadok, E.: I3FS an In-Kernel Integrity Checker and Intrusion Detection File System. In: Proceedings of the 18th USENIX Large Installation System Administration Conference (LISA 2004) (2004)"},{"key":"32_CR18","unstructured":"PC\/SC workgroup, Presentation of the Interoperability specification for ICCs and Personal Computer System (PC\/SC) Revision 1.0, parts 1-8. (1997), http:\/\/www.pcscworkgroup.com\/"},{"key":"32_CR19","unstructured":"PC\/SC workgroup, Presentation of the Interoperability specification for ICCs and Personal Computer System (PC\/SC), Revision 2.0. White Paper (1999), http:\/\/www.pcscworkgroup.com\/"},{"key":"32_CR20","doi-asserted-by":"crossref","unstructured":"Rees, J., Honeyman, P.: Webcard: a Java Card Web Server. In: Proc. of CARDIS 2000, pp. 197\u2013208 (2000)","DOI":"10.1007\/978-0-387-35528-3_11"},{"key":"32_CR21","unstructured":"RSA Security Inc., PKCS11: Cryptographic Token Interface Standard v.2.20 (2004), http:\/\/www.rsasecurity.com\/"},{"key":"32_CR22","unstructured":"RSA Security Inc., PKCS15: Cryptographic Token Information Format Standard v.1.1 (2000), http:\/\/www.rsasecurity.com\/"},{"key":"32_CR23","volume-title":"Linux Device Drivers","author":"A. Rubini","year":"2001","unstructured":"Rubini, A., Corbet, J.: Linux Device Drivers, 2nd edn. O\u2019Reilly Associates, Inc., Sebastopol (2001)","edition":"2"},{"key":"32_CR24","unstructured":"Schoen, S.: Trusted Computing: Promise and Risk, Report of Electronic Frontier Foundation (2003), http:\/\/www.eff.org"},{"key":"32_CR25","unstructured":"Stallman, R.: Can you trust your computer (2002), http:\/\/www.gnu.org\/philosophy\/can-you-trust.html"},{"key":"32_CR26","unstructured":"Trusted Computing Group, TCG Specification Architecture Overview (2004)"},{"key":"32_CR27","unstructured":"van Doorn, L., Ballintijn, G., Arbaugh, W.A.: Signed Executables for Linux. University of Maryland Technical Report CS-TR-4259 (2001)"},{"key":"32_CR28","unstructured":"Zadok, E.: Stackable File System as a Security Tool. CS dept. Columbia University Technical Report CUCS-036-99 (1999)"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy, and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11537878_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:12:44Z","timestamp":1605643964000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11537878_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540282242","9783540317968"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/11537878_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}