{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:18:15Z","timestamp":1726003095345},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030053444"},{"type":"electronic","value":"9783030053451"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05345-1_22","type":"book-chapter","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T09:07:56Z","timestamp":1544173676000},"page":"261-271","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Dynamic Integrity Transitivity Model for the Cloud"],"prefix":"10.1007","author":[{"given":"Rongyu","family":"He","sequence":"first","affiliation":[]},{"given":"Haonan","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"unstructured":"TCG Specfication Architecture Overview. \nhttps:\/\/www.trustedcomputinggroup.org","key":"22_CR1"},{"issue":"1\u20132","key":"22_CR2","first-page":"49","volume":"9","author":"A Khan","year":"2017","unstructured":"Khan, A.: Virtual machine security. Int. J. Inf. Comput. Secur. 9(1\u20132), 49\u201384 (2017)","journal-title":"Int. J. Inf. Comput. Secur."},{"doi-asserted-by":"crossref","unstructured":"Roscoe, A.W., Goldsmith, M.H.: What is intransitive noninterference? In: Proceedings of the 12th IEEE Computer Security Foundations Workshop, pp. 228\u2013238. IEEE (1999)","key":"22_CR3","DOI":"10.1109\/CSFW.1999.779776"},{"issue":"10","key":"22_CR4","first-page":"78","volume":"32","author":"Z Fan","year":"2011","unstructured":"Fan, Z., Shu, C., Yongxuan, S.: Noninterference model for integrity. J. Commun. 32(10), 78\u201385 (2011)","journal-title":"J. Commun."},{"issue":"1","key":"22_CR5","doi-asserted-by":"publisher","first-page":"74","DOI":"10.3724\/SP.J.1016.2010.00074","volume":"33","author":"X Zhang","year":"2010","unstructured":"Zhang, X., et al.: A formal method based on noninterference for analyzing trust chain of trusted computing platform. Chin. J. Comput. 33(1), 74\u201381 (2010)","journal-title":"Chin. J. Comput."},{"doi-asserted-by":"crossref","unstructured":"Zhang, X., et al.: SecureBus: towards application-transparent trusted computing with mandatory access control. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, pp. 117\u2013126. ACM (2007)","key":"22_CR6","DOI":"10.1145\/1229285.1229304"},{"issue":"3","key":"22_CR7","first-page":"6","volume":"30","author":"X Zhang","year":"2009","unstructured":"Zhang, X., Chen, Y.L., Shen, C.X.: Non-interference trusted model based on processes. J. Commun. 30(3), 6\u201311 (2009)","journal-title":"J. Commun."},{"unstructured":"Perez, R., et al.: vTPM: virtualizing the trusted platform module. In: Proceedings of the 15th Conference on USENIX Security Symposium, pp. 305\u2013320 (2006)","key":"22_CR8"},{"key":"22_CR9","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-8348-9452-6_4","volume-title":"Trusted Computing","author":"V Scarlata","year":"2008","unstructured":"Scarlata, V., et al.: TPM virtualization: building a general framework. In: Pohlmann, N., Reimer, H. (eds.) Trusted Computing, pp. 43\u201356. Vieweg+Teubner, Berlin (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-8348-9452-6_4"},{"key":"22_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-540-68979-9_9","volume-title":"Trusted Computing - Challenges and Applications","author":"P England","year":"2008","unstructured":"England, P., Loeser, J.: Para-virtualized TPM sharing. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol. 4968, pp. 119\u2013132. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-68979-9_9"},{"key":"22_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-85886-7_1","volume-title":"Information Security","author":"A-R Sadeghi","year":"2008","unstructured":"Sadeghi, A.-R., St\u00fcble, C., Winandy, M.: Property-based TPM virtualization. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 1\u201316. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-85886-7_1"},{"unstructured":"Strasser, M.: A software-based TPM emulator for Linux. Department of Computer Science, Swiss Federal Institute of Technology, Zurich (2004)","key":"22_CR12"},{"issue":"10","key":"22_CR13","doi-asserted-by":"publisher","first-page":"1905","DOI":"10.3923\/itj.2013.1905.1913","volume":"12","author":"H Rongyu","year":"2013","unstructured":"Rongyu, H., Shaojie, W., Lu, I.: A user-specific trusted virtual environment for cloud computing. Inf. Technol. J. 12(10), 1905\u20131913 (2013)","journal-title":"Inf. Technol. J."},{"unstructured":"Rushby, J.: Noninterference, Transitivity, and Channel-Control Security Policies. SRI International, Computer Science Laboratory (1992)","key":"22_CR14"},{"doi-asserted-by":"crossref","unstructured":"Garfinkel, T., et al.: Terra: a virtual machine-based platform for trusted computing. In: ACM SIGOPS Operating Systems Review, pp. 193\u2013206. ACM (2003)","key":"22_CR15","DOI":"10.1145\/945445.945464"},{"unstructured":"Garfinkel, T., et al.: A virtual machine introspection based architecture for intrusion detection. In: Ndss, pp. 191\u2013206 (2003)","key":"22_CR16"},{"unstructured":"Jones, S.T., Arpaci-Dusseau, A.C., Arpaci-Dusseau, R.H.: Antfarm: tracking processes in a virtual machine environment. In: ATEC 2006: Proceedings of the Annual Conference on USENIX 2006 Annual Technical Conference, p. 1 (2006)","key":"22_CR17"},{"doi-asserted-by":"crossref","unstructured":"Payne, B.D., Martim, D.P.A., Lee, W.: Secure and flexible monitoring of virtual machines. In: Twenty-Third Annual of Computer Security Applications Conference, ACSAC 2007, pp. 385\u2013397. IEEE (2007)","key":"22_CR18","DOI":"10.1109\/ACSAC.2007.10"},{"unstructured":"Vulnerability in xenserver could result in privilege escalation and arbitrary code execution. \nhttp:\/\/support.citrix.com\/article\/CTX118766\n\n. Accessed Nov 2011","key":"22_CR19"},{"unstructured":"Garfinkel, T., Rosenblum, M., Boneh, D.: Flexible OS support and applications for trusted computing. In: HotOS, pp. 145\u2013150 (2003)","key":"22_CR20"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05345-1_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T09:19:11Z","timestamp":1544174351000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05345-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030053444","9783030053451"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05345-1_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/space2018.cse.iitk.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}