{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T23:37:28Z","timestamp":1767137848316,"version":"build-2238731810"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319055053","type":"print"},{"value":"9783319055060","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-05506-0_9","type":"book-chapter","created":{"date-parts":[[2014,4,29]],"date-time":"2014-04-29T05:27:35Z","timestamp":1398749255000},"page":"90-101","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards a Trusted Launch Mechanism for Virtual Machines in Cloud Computing"],"prefix":"10.1007","author":[{"given":"Juan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xuhui","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Qingfei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Hongxin","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Sijun","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,4,30]]},"reference":[{"issue":"5","key":"9_CR1","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1145\/1165389.945464","volume":"37","author":"T Garfinkel","year":"2003","unstructured":"Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: a virtual machine-based platform for trusted computing. ACM SIGOPS Operating Syst. Rev. 37(5), 193\u2013206 (2003)","journal-title":"ACM SIGOPS Operating Syst. Rev."},{"key":"9_CR2","unstructured":"Intel Corp. Intel Trusted Execution Technology. http:\/\/www.intel.com\/technology\/security\/"},{"key":"9_CR3","unstructured":"Intel Corp. Trusted Boot (tboot). http:\/\/sourceforge.net\/projects\/tboot (2007)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Azab, A.M., Ning, P., Wang, Z., Jiang, X., Zhang, X., Skalsky, N.C.: HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 38\u201349. ACM (2010)","DOI":"10.1145\/1866307.1866313"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Dai, W., Jin, H., Zou, D., Xu, S., Zheng, W., Shi, L.: TEE: a virtual DRTM based execution environment for secure cloud-end computing. In: Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS 2010), New York (2010)","DOI":"10.1145\/1866307.1866390"},{"key":"9_CR6","volume-title":"A Practical Guide to Trusted Computing","author":"D Challener","year":"2008","unstructured":"Challener, D., Yoder, K., Catherman, R.: A Practical Guide to Trusted Computing. Pearson Education, Indianapolis (2008)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proceedings of 11th ACM Conference on Computer and Communications Security, ACM Press (2004)","DOI":"10.1145\/1030083.1030103"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Azab, A.M., Ning, P., Zhang, X.: DSICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms. In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS \u201911), pp. 375\u2013388. ACM, New York (2011)","DOI":"10.1145\/2046707.2046752"},{"key":"9_CR9","unstructured":"Suh, G.E., Clarke, D., Gassend, B., et al.: Hardware mechanisms for memory integrity checking[R]. MIT LCS TR-872 (2003)"},{"key":"9_CR10","unstructured":"Maheshwari, U., Vingralek, R., Shapiro, W.: How to build a trusted database system on untrusted storage. In: Proceedings of the 4th USENIX Symposium on Operating System Design and Implementation (2000)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Tomonori, F., Masanori, O.: Protecting the integrity of an entire file system. In: First IEEE International Workshop on Information Assurance (2003)","DOI":"10.1109\/IWIAS.2003.1192462"},{"key":"9_CR12","unstructured":"Santos, N., Gummadi, K.P., Rodrigues, R.: Towards trusted cloud computing. In: Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, HotCloud2009. USENIX Association, Berkeley (2009)"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Schiffman, J., Moyer, T., Vijayakumar, H., Jaeger, T., McDaniel, P.: Seeding clouds with trust anchors. In: Proceedings of the 2010 ACM Workshop on CloudComputing Security, CCSW 2010, pp. 43\u201346. ACM, New York (2010)","DOI":"10.1145\/1866835.1866843"},{"key":"9_CR14","first-page":"511","volume-title":"CLOSER","author":"M Aslam","year":"2012","unstructured":"Aslam, M., Gehrmann, C., Rasmusson, L., Bjorkman, M.: Securely launching virtual machines on trustworthy platforms in a public cloud - an enterprise\u2019s perspective. In: Leymann, F., Ivanov, I., van Sinderen, M., Shan, T. (eds.) CLOSER, pp. 511\u2013521. SciTePress, Copenhagen (2012)"},{"key":"9_CR15","series-title":"LNCS","first-page":"309","volume-title":"ICISC 2012","author":"N Paladi","year":"2013","unstructured":"Paladi, N., Gehrmann, C., Aslam, M., Morenius, F.: Trusted launch of virtual machine instances in public iaas environments. In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. LNCS, vol. 7839, pp. 309\u2013323. Springer, Heidelberg (2013)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-05506-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T12:20:54Z","timestamp":1712060454000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-05506-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319055053","9783319055060"],"references-count":15,"aliases":["10.1007\/978-3-319-14254-8_9"],"URL":"https:\/\/doi.org\/10.1007\/978-3-319-05506-0_9","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"30 April 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}