{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:39:39Z","timestamp":1742913579393,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030551797"},{"type":"electronic","value":"9783030551803"}],"license":[{"start":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T00:00:00Z","timestamp":1598313600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T00:00:00Z","timestamp":1598313600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-55180-3_10","type":"book-chapter","created":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T23:28:02Z","timestamp":1598311682000},"page":"132-144","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Realizing Macro Based Technique for Behavioral Attestation on Remote Platform"],"prefix":"10.1007","author":[{"given":"Alhuseen Omar","family":"Alsayed","sequence":"first","affiliation":[]},{"given":"Muhammad","family":"Binsawad","sequence":"additional","affiliation":[]},{"given":"Jawad","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Ahmad Shahrafidz","family":"Khalid","sequence":"additional","affiliation":[]},{"given":"Waqas","family":"Ahmed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,25]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","DOI":"10.1049\/PBPC006E","volume-title":"Trusted Computing","author":"C Mitchell","year":"2005","unstructured":"Mitchell, C., Mitchell, C., Mitchell, C.: Trusted Computing. Springer, Heidelberg (2005)"},{"key":"10_CR2","unstructured":"Bajikar, S.: Trusted platform module (TPM) based security on notebook PCS-white paper. Mobile Platforms Group, Intel Corporation, 20 June 2002"},{"key":"10_CR3","unstructured":"Sailer, R., Zhang, X., Jaeger, T., Van\u00a0Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture (2004)"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Ali, T., Ali, J., Ali, T., Nauman, M., Musa, S.: Efficient, scalable and privacy preserving application attestation in a multi stakeholder scenario. In: International Conference on Computational Science and its Applications, pp. 407\u2013421. Springer (2016)","DOI":"10.1007\/978-3-319-42089-9_29"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Syed, T.A., Jan, S., Musa, S., Ali, J.: Providing efficient, scalable and privacy preserved verification mechanism in remote attestation. In: 2016 International Conference on Information and Communication Technology (ICICTM), pp. 236\u2013245. IEEE (2016)","DOI":"10.1109\/ICICTM.2016.7890807"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Ali, T., Zuhairi, M., Ali, J., Musa, S., Nauman, M.: A complete behavioral measurement and reporting: optimized for mobile devices. In: COMPSE 2016 - 1st EAI International Conference on Computer Science and Engineering (2017)","DOI":"10.4108\/eai.27-2-2017.152252"},{"key":"10_CR7","doi-asserted-by":"publisher","unstructured":"Syed, T.A., Ismail, R., Musa, S., Nauman, M., Khan, S.: A sense of others: behavioral attestation of unix processes on remote platforms. In: Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2012, pp. 51:1\u201351:7. ACM, New York (2012). \nhttps:\/\/doi.org\/10.1145\/2184751.2184814","DOI":"10.1145\/2184751.2184814"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Jaeger, T., Sailer, R., Shankar, U.: Prima: policy-reduced integrity measurement architecture. In: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies, pp. 19\u201328. ACM (2006)","DOI":"10.1145\/1133058.1133063"},{"key":"10_CR9","doi-asserted-by":"publisher","unstructured":"Gu, L., Ding, X., Deng, R.H., Xie, B., Mei, H.: Remote attestation on program execution. In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, pp. 11\u201320. ACM, New York (2008). \nhttps:\/\/doi.org\/10.1145\/1456455.1456458","DOI":"10.1145\/1456455.1456458"},{"key":"10_CR10","unstructured":"Liang, G., Ding, X., Deng, R.H., Xie, B., Mei, H.: Remote attestation on function execution (2009)"},{"issue":"4","key":"10_CR11","doi-asserted-by":"publisher","first-page":"2149","DOI":"10.1007\/s11235-011-9538-9","volume":"52","author":"M Nauman","year":"2013","unstructured":"Nauman, M., Ali, T., Rauf, A.: Using trusted computing for privacy preserving keystroke-based authentication in smartphones. Telecommun. Syst. 52(4), 2149\u20132161 (2013)","journal-title":"Telecommun. Syst."},{"issue":"5","key":"10_CR12","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/52.605929","volume":"14","author":"AP Kosoresow","year":"1997","unstructured":"Kosoresow, A.P., Hofmeyr, S.A.: Intrusion detection via system call traces. IEEE Softw. 14(5), 35\u201342 (1997)","journal-title":"IEEE Softw."},{"key":"10_CR13","unstructured":"Trusting Computing Group (2014). \nhttp:\/\/www.trustedcomputinggroup.org\/\n\n. Accessed 19 July 2014"},{"key":"10_CR14","doi-asserted-by":"publisher","unstructured":"Loscocco, P.A., Wilson, P.W., Pendergrass, J.A., McDonell, C.D.: Linux kernel integrity measurement using contextual inspection. In: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, STC 2007, pp. 21\u201329. ACM, New York (2007). \nhttps:\/\/doi.org\/10.1145\/1314354.1314362","DOI":"10.1145\/1314354.1314362"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Kil, C., Sezer, E.C., Azab, A.M., Ning, P., Zhang, X.: Remote attestation todynamic system properties: towards providing complete system integrity evidence. In: IEEE\/IFIPInternational Conference on Dependable Systems & Networks, DSN 2009, pp. 115\u2013124. IEEE (2009)","DOI":"10.1109\/DSN.2009.5270348"},{"key":"10_CR16","unstructured":"Axelsson, S.: Intrusion detection systems: a survey and taxonomy. Technical report (2000)"},{"issue":"8","key":"10_CR17","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1016\/S1389-1286(98)00017-6","volume":"31","author":"H Debar","year":"1999","unstructured":"Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion-detection systems. Comput. Netw. 31(8), 805\u2013822 (1999)","journal-title":"Comput. Netw."},{"key":"10_CR18","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of selffor unix processes. In: Proceedings of 1996 IEEE Symposium on Security and Privacy, pp. 120\u2013128. IEEE (1996)"},{"key":"10_CR19","volume-title":"Access Control Systems: Security, Identity Management and Trust Models","author":"M Benantar","year":"2006","unstructured":"Benantar, M.: Access Control Systems: Security, Identity Management and Trust Models. Springer, Heidelberg (2006)"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-55180-3_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T23:52:48Z","timestamp":1598313168000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-55180-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,25]]},"ISBN":["9783030551797","9783030551803"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-55180-3_10","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,25]]},"assertion":[{"value":"25 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IntelliSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Proceedings of SAI Intelligent Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"intellisys2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/saiconference.com\/IntelliSys","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}