{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T20:43:47Z","timestamp":1725655427100},"publisher-location":"Wiesbaden","reference-count":26,"publisher":"Vieweg+Teubner Verlag","isbn-type":[{"type":"print","value":"9783528059101"},{"type":"electronic","value":"9783322849847"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-322-84984-7_34","type":"book-chapter","created":{"date-parts":[[2012,1,27]],"date-time":"2012-01-27T06:33:01Z","timestamp":1327645981000},"page":"346-361","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing Security of Computing Platforms with TC-Technology"],"prefix":"10.1007","author":[{"given":"Oliver","family":"Altmeyer","sequence":"first","affiliation":[]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[]},{"given":"Marcel","family":"Selhorst","sequence":"additional","affiliation":[]},{"given":"Christian","family":"St\u00fcble","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"N. Asokan, H. Debar, M. Steiner, M. Waidner: Authenticating Public Terminals. In: CompNet Journal, Vol. 31, No. 8, 1999.","DOI":"10.1016\/S1389-1286(98)00020-6"},{"key":"34_CR2","unstructured":"Yuqun Chen, Paul England, Marcus Peinado, Bryan Willman: \u201cHigh Assurance Computing on Open Hardware Architectures\u201d. In: Microsoft Research Technical Report MSR-TR-2003-20, March 2003."},{"key":"34_CR3","unstructured":"Common Criteria Project Sponsoring Organization: \u201eCommon Criteria for Information Technology Security Evaluation\u201c, Version 2.1, 1999."},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Jeremy Epstein: \u201cA Prototype for Trusted X Labeling Policies\u201d. In: Annual Computer Security Application Conference (ACSAC), 1990.","DOI":"10.1109\/CSAC.1990.143778"},{"key":"34_CR5","doi-asserted-by":"crossref","unstructured":"Jeremy Epstein, John McHugh, Hilarie Orman, Rita Pascale, Ann Marmor-Squires, Bonnie Danner, Charles R. Martin, Martha Branstad, Glen Benson and Doug Rothnie: A High Assurance Window System Prototype JCS, Vol. 2, No. 2, 1993.","DOI":"10.3233\/JCS-1993-22-306"},{"key":"34_CR6","volume-title":"Security Architectures Revisited: Proceedings of the 10th ACM SIGOPS European Workshop","author":"H Hermann","year":"2002","unstructured":"Hermann H\u00e4rtig, Security Architectures Revisited: Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, 2002."},{"key":"34_CR7","unstructured":"Hermann H\u00e4rtig, Michael Hohmuth, Jean Wolter: \u201cTaming Linux\u201d, In Proceedings of PART, 1998."},{"key":"34_CR8","unstructured":"H. H\u00e4rtig, J. Loeser, F. Mehnert, L. Reuther, M. Pohlack, A. Warg: \u201cAn I\/O Architecture for Mikrokernel-Based Operating Systems\u201d. In: Technical Report TUD-F103-08-Juli-2003, TU Dresden, July 2003."},{"key":"34_CR9","unstructured":"M. Hohmuth, Linux-Emulation auf einem Mikrokern, Master Thesis, Dresden University of Technology, Dept. of Computer Science, 1996"},{"key":"34_CR10","unstructured":"LaGrande: Technology Archtitectural Overview, Intel White Paper, Intel, September 2003."},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Jochen Liedke: Clans and Chiefs. A new Kernel Level Concept for Operating Systems, Proceedings of the 12th GI-Fachtagung, 1992","DOI":"10.1007\/978-3-642-77422-5_25"},{"key":"34_CR12","doi-asserted-by":"crossref","unstructured":"Jochen Liedke: \u201cOn \u03bc-Kernel Construction\u201d, In Proceedings of Symposium on Operating System Principles (SOSP), 1995.","DOI":"10.1145\/224056.224075"},{"key":"34_CR13","unstructured":"Liedtke, U. Dannowski, K. Elphinstone, G. Liefl\u00e4nder, E. Skoglund, V. Uhlig, C. Ceelen, A. Haeberlen, M. V\u00f6lp: \u201cThe L4KA Vision\u201d, University of Karlsruhe, 2001. White Paper, April 2001"},{"key":"34_CR14","unstructured":"Peter Loscocco and Stephen Smalley: Integrating Flexible Support for Security Policies into the Linux Operating System, U.S. National Security Agency (NSA),2001."},{"key":"34_CR15","unstructured":"S. Micali, L. Reyzin: Physical Observable Cryptography: Proceedings of the Theory of Cryptography Conference, TCC 2004, Vol. 2951, LNCS, 2004."},{"key":"34_CR16","unstructured":"Craig Mundie, Pierre de Vries, Peter Haynes, Matt Corwine, Trustworthy Computing, Microsoft Corporation, Oktober, 2003."},{"key":"34_CR17","unstructured":"Siani Pearson: Trusted Computing Platforms \u2014 TCPA technology in context, Hewlett-Packard Company, Prestice Hall PTR, 2003"},{"key":"34_CR18","doi-asserted-by":"crossref","unstructured":"Birgit Pfitzmann, James Riordan, Christian St\u00fcble, Michael Waidner, Arnd Weber: \u201eThe PERSEUS System Architecture\u201c. In: IBM Technical Report #93381, IBM Research Division, Z \u00fcrich, 2001.","DOI":"10.1007\/978-3-663-05918-9_1"},{"key":"34_CR19","doi-asserted-by":"crossref","unstructured":"Birgit Pfitzmann, James Riordan, Christian St\u00fcble, Michael Waidner, Arnd Weber: \u201eDie PERSEUS Sicherheitsarchitektur\u201c. In: Verl \u00e4ssliche Informationssysteme (VIS) 2001, p. 1\u201318, 2001.","DOI":"10.1007\/978-3-663-05918-9_1"},{"key":"34_CR20","doi-asserted-by":"crossref","unstructured":"Ahmad-Reza Sadeghi, Christian St\u00fcble: \u201eTaming\u201c Trusted Computing\u201d by Operating System Design\u201c, Proceedings of the 4th International Workshop on Information Security Applications (WISA), Korea, 2003.","DOI":"10.1007\/978-3-540-24591-9_22"},{"key":"34_CR21","unstructured":"R. W. Scheiffler and J. Gettys: X Window System. In: Digital Press, 1992"},{"key":"34_CR22","doi-asserted-by":"crossref","unstructured":"Jonathan S. Shapiro, Jonathan M. Smith and David J. Farber: EROS: a fast capability system, SOSP99,1999.","DOI":"10.1145\/319151.319163"},{"key":"34_CR23","unstructured":"Gesetz \u00fcber Rahmenbedingungen f\u00fcr elektronische Signaturen, BGB, Mai, 2001"},{"key":"34_CR24","unstructured":"Verordnung zur digitalen Signatur, Nov. 2001"},{"key":"34_CR25","unstructured":"Trusted Computing Group: \u201eTrusted Platform Module (TPM) Main Specification vl.2\u201c, December 2003."},{"key":"34_CR26","doi-asserted-by":"crossref","unstructured":"J. D. Tygar and A. Whitten: \u201cWWW Electronic Commerce and Java Trojan Horses\u201d, Proceedings of the 2nd USENIX Workshop on Electronic Commerce, 1996.","DOI":"10.1145\/248052.248054"}],"container-title":["ISSE 2004 \u2014 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-322-84984-7_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T16:11:41Z","timestamp":1607616701000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-322-84984-7_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783528059101","9783322849847"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-322-84984-7_34","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}