{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:48:19Z","timestamp":1742392099703,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":42,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208273"},{"type":"electronic","value":"9783540245919"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24591-9_22","type":"book-chapter","created":{"date-parts":[[2010,7,29]],"date-time":"2010-07-29T07:36:56Z","timestamp":1280389016000},"page":"286-302","source":"Crossref","is-referenced-by-count":14,"title":["Taming \u201cTrusted Platforms\u201d by Operating System Design"],"prefix":"10.1007","author":[{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"first","affiliation":[]},{"given":"Christian","family":"St\u00fcble","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Alkassar, A., St\u00fcble, C.: Towards secure IFF \u2014 preventing mafia fraud attacks. In: Proceedings of IEEE Military Conference, MILCOM (2002)","key":"22_CR1"},{"key":"22_CR2","volume-title":"Security Engineering \u2014 A Guide to Building Dependable Distributed Systems","author":"R.J. Anderson","year":"2001","unstructured":"Anderson, R.J.: Security Engineering \u2014 A Guide to Building Dependable Distributed Systems. John Wiley & Sons, Chichester (2001)"},{"unstructured":"Anderson, R.J.: Security in open versus closed systems \u2014 the dance of Boltzmann, Coase and Moore. Technical report, Cambridge University, England (2002)","key":"22_CR3"},{"unstructured":"Anderson, R.J.: The TCPA\/Palladium FAQ (2002), http:\/\/www.cl.cam.ac.uk\/~rja14\/tcpa-faq.html","key":"22_CR4"},{"unstructured":"Anderson, R.J., Kuhn, M.: Tamper resistance \u2013 a cautionary note. In: Proceedings of the 2nd USENIX Workshop on Electronic Commerce [38], pp. 1\u201311","key":"22_CR5"},{"key":"22_CR6","volume-title":"The Pentium Microprocessor","author":"J.L. Antonakos","year":"1997","unstructured":"Antonakos, J.L.: The Pentium Microprocessor. Prentice Hall Inc., Englewood Cliffs (1997)"},{"doi-asserted-by":"crossref","unstructured":"Arbaugh, W.A.: Improving the TCPA specification. IEEE Computer, 77\u201379 (August 2002)","key":"22_CR7","DOI":"10.1109\/MC.2002.1023792"},{"doi-asserted-by":"crossref","unstructured":"Arbaugh, W.A., Farber, D.J., Smith, J.M.: A reliable bootstrap architecture. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1997, pp. 65\u201371. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press (1997)","key":"22_CR8","DOI":"10.1109\/SECPRI.1997.601317"},{"issue":"8","key":"22_CR9","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/S1389-1286(98)00020-6","volume":"31","author":"N. Asokan","year":"1999","unstructured":"Asokan, N., Debar, H., Steiner, M., Waidner, M.: Authenticating public terminals. Computer Networks\u00a031(8), 861\u2013870 (1999)","journal-title":"Computer Networks"},{"unstructured":"Carroll, A., Juarez, M., Polk, J., Leininger, T.: Microsoft \u201dPalladium\u201d: A business overview. Technical report, Microsoft Content Security Business Unit (August 2002)","key":"22_CR10"},{"unstructured":"Carroll, A., Juarez, M., Polk, J., Leininger, T.: Microsoft \u201cPalladium\u201d: A business overview \u2014 combining microsoft windows features, personal computing hardware, and software applications for greater security, personal privacy and system integrity. White paper, Microsoft Windows Trusted Platform Technologies (July 2002)","key":"22_CR11"},{"unstructured":"Common Criteria Project Sponsoring Organisations. Common Criteria for Information Technology Security Evaluation, Version 2.1, adopted by ISO\/IEC as ISO\/IEC International Standard (IS) 15408 1\u20133 (August 1999), Available from http:\/\/csrc.ncsl.nist.gov\/cc\/ccv20\/ccv2list.htm","key":"22_CR12"},{"unstructured":"M. Corporation. Building a secure platform for trustworthy computing. White paper, Microsoft Corporation (December 2002)","key":"22_CR13"},{"unstructured":"M. Corporation. Microsoft \u201dPalladium\u201d technical FAQ, http:\/\/www.microsoft.com (August 2002)","key":"22_CR14"},{"doi-asserted-by":"crossref","unstructured":"Eastlake, D.E., Crocker, S.D., Schiller, J.I.: Randomness requirements for security. Internet Request for Comment RFC 1750, Internet Engineering Task Force (December 1994)","key":"22_CR15","DOI":"10.17487\/rfc1750"},{"doi-asserted-by":"crossref","unstructured":"Fraim, L.: SCOMP: A solution to the multilevel security problem. IEEE Computer, 26\u201334 (July 1983)","key":"22_CR16","DOI":"10.1109\/MC.1983.1654440"},{"key":"22_CR17","volume-title":"Building a Secure Computer System","author":"M. Gasser","year":"1988","unstructured":"Gasser, M.: Building a Secure Computer System. Van Nostrand Reinhold Co., New York (1988)"},{"doi-asserted-by":"crossref","unstructured":"Gefflaut, A., Jaeger, T., Park, Y., Liedke, J., Elphistone, K.J., Uhlig, V., Tidswell, J.E., Deller, L., Reuter, L.: The SawMill multiserver approach. In: ACM SIGOPS European Workshop (September 2000)","key":"22_CR18","DOI":"10.1145\/566726.566751"},{"unstructured":"Gutmann, P.: Software generation of practically strong random numbers. In: Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas, USA, USENIX (January 1998)","key":"22_CR19"},{"unstructured":"H\u00e4rtig, H., Hohmuth, M., Wolter, J.: Taming linux. In: Proceedings of PART 1998. TU Dresden (1998)","key":"22_CR20"},{"issue":"1","key":"22_CR21","first-page":"5","volume":"2","author":"H. H\u00e4rtig","year":"1993","unstructured":"H\u00e4rtig, H., Kowalski, O., K\u00fchnhauser, W.: The BirliX security architecture. Journal of Computer Security\u00a02(1), 5\u201321 (1993)","journal-title":"Journal of Computer Security"},{"doi-asserted-by":"crossref","unstructured":"Jaeger, T., Elphinstone, K., Liedtke, J., Panteleenko, V., Park, Y.: Flexible access control using IPC redirection. In: Hot Topics in Operating Systems (HotOS VII), pp. 191\u2013196, Rio Rico, AZ (March 1999)","key":"22_CR22","DOI":"10.1109\/HOTOS.1999.798399"},{"unstructured":"Leslie, B., Heiser, G.: Towards untrusted device drivers. Technical Report UNSW-CSE-TR-0303, School of Computer Science and Engineering (March 2003)","key":"22_CR23"},{"unstructured":"Liedke, J.: Clans and Chiefs. a new kernel level concept for operating systems. Working paper, GMD (1991)","key":"22_CR24"},{"doi-asserted-by":"crossref","unstructured":"Liedke, J.: Towards real micro-kernels. Communications of the ACM\u00a039(9) (1996)","key":"22_CR25","DOI":"10.1145\/234215.234473"},{"unstructured":"Loscocco, P., Smalley, S.: Integrating flexible support for security policies into the Linux operating system. Technical report, U.S. National Security Agency (NSA) (February 2001)","key":"22_CR26"},{"unstructured":"Mundie, C., de Vries, P., Haynes, P., Corwine, M.: Microsoft whitepaper on trustworthy computing. Technical report, Microsoft Corporation (October 2002)","key":"22_CR27"},{"doi-asserted-by":"crossref","unstructured":"Pfitzmann, B., Riordan, J., St\u00fcble, C., Waidner, M., Weber, A.: The PERSEUS system architecture. Technical Report RZ 3335 (#93381), IBM Research Division, Zurich Laboratory (April 2001)","key":"22_CR28","DOI":"10.1007\/978-3-663-05918-9_1"},{"doi-asserted-by":"crossref","unstructured":"Raymond, E.S.: The cathedral and the bazaar (August 1998), http:\/\/www.openresources.com\/documents\/cathedral-bazaar\/","key":"22_CR29","DOI":"10.5210\/fm.v3i2.578"},{"unstructured":"Safford, D.: Clarifying misinformation on TCPA. White paper, IBM Research (October 2002)","key":"22_CR30"},{"unstructured":"Safford, D.: The need for TCPA. White paper, IBM Research (October 2002)","key":"22_CR31"},{"unstructured":"Schneier, B.: Palladium and the TCPA, http:\/\/www.counterpane.com\/crypto-gram-0208.html#1","key":"22_CR32"},{"unstructured":"Schoen, S.: Palladium details (2002), http:\/\/www.activewin.com\/articles\/2002\/pd.shtml","key":"22_CR33"},{"doi-asserted-by":"crossref","unstructured":"Shapiro, J.S., Smith, J.M., Farber, D.J.: EROS: a fast capability system. In: Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP 1999), pp. 170\u2013185. Kiawah Island Resort, near Charleston, Sout Carolina (December 1999);","key":"#cr-split#-22_CR34.1","DOI":"10.1145\/319151.319163"},{"unstructured":"Appeared as ACM Operating Systems Review 33.5","key":"#cr-split#-22_CR34.2"},{"unstructured":"Trusted Computing Platform Alliance (TCPA). TCPA PC specific implementation specification Version 1.00 (September 2001)","key":"22_CR35"},{"unstructured":"Trusted Computing Platform Alliance (TCPA). Main specification, Version 1.1b (February 2002)","key":"22_CR36"},{"unstructured":"Tygar, J.D., Whitten, A.: WWW electronic commerce and Java Trojan horses. In: Proceedings of the 2nd USENIX Workshop on Electronic Commerce [38], pp. 243\u2013250","key":"22_CR37"},{"unstructured":"USENIX. Proceedings of the 2nd USENIX Workshop on Electronic Commerce, Oakland, California (November 1996)","key":"22_CR38"},{"unstructured":"Wheeler, D.A.: More than a gigabuck: Estimating GNU\/Linux\u2019s size (June 2001), http:\/\/www.dwheeler.com\/sloc\/","key":"22_CR39"},{"unstructured":"Wintermute. TCPA and Palladium technical analysis (December 2002), http:\/\/wintermute.homelinux.org\/miscelanea\/TCPASecurity.txt","key":"22_CR40"},{"unstructured":"Zimmerman, P.: The Official PGP User\u2019s Guide. prz@acm.org, The MIT Press (1994) (in press), More in http:\/\/www.pegasus.esprit.ec.org\/people\/arne\/pgp.html","key":"22_CR41"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24591-9_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T15:20:14Z","timestamp":1740324014000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24591-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208273","9783540245919"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24591-9_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}