{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:04:45Z","timestamp":1725516285705},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540689782"},{"type":"electronic","value":"9783540689799"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-68979-9_1","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T12:02:26Z","timestamp":1218542546000},"page":"1-13","source":"Crossref","is-referenced-by-count":11,"title":["Practical Techniques for Operating System Attestation"],"prefix":"10.1007","author":[{"given":"Paul","family":"England","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Specifications are available on the TCG web site, http:\/\/www.trustedcomputinggroup.org"},{"key":"1_CR2","unstructured":"Microft Online Crash Analysis data"},{"key":"1_CR3","unstructured":"Arbaugh, W., Farber, D., Smith, J.: A secure and reliable bootstrap architecture (1997)"},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1179474.1179479","volume-title":"STC 2006: Proceedings of the first ACM workshop on Scalable trusted computing","author":"L. Chen","year":"2006","unstructured":"Chen, L., Landfermann, R., Lohr, M., Rohe, A.S., Stuble, C.: A protocol for property-based attestation. In: STC 2006: Proceedings of the first ACM workshop on Scalable trusted computing, pp. 7\u201316. ACM, New York (2006)"},{"issue":"7","key":"1_CR5","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MC.2003.1212691","volume":"36","author":"P. England","year":"2003","unstructured":"England, P., Lampson, B., Manferdelli, J., Peinado, M., Willman, B.: A trusted open platform. Computer\u00a036(7), 55\u201362 (2003)","journal-title":"Computer"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/3-540-45450-0_27","volume-title":"Information Security and Privacy","author":"P. England","year":"2002","unstructured":"England, P., Peinado, M.: Authenticated operation of open computing devices. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol.\u00a02384, pp. 346\u2013361. Springer, Heidelberg (2002)"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Franklin, M., Mitcham, K., Smith, S.W., Stabiner, J., Wild, O.: Ca-in-a-box. In: EuroPKI: Lecture notes in computer science, pp. 180\u2013190 (2005)","DOI":"10.1007\/11533733_12"},{"key":"1_CR8","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1145\/945445.945464","volume-title":"SOSP 2003: Proceedings of the nineteenth ACM symposium on Operating systems principles","author":"T. Garfinkel","year":"2003","unstructured":"Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: a virtual machine-based platform for trusted computing. In: SOSP 2003: Proceedings of the nineteenth ACM symposium on Operating systems principles, pp. 193\u2013206. ACM, New York (2003)"},{"key":"1_CR9","unstructured":"Grawrock, D.: The Intel Safer Computing Initiative. Intel Press (2006)"},{"key":"1_CR10","unstructured":"Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation: a virtual machine directed approach to trusted computing. In: VM 2004: Proceedings of the 3rd conference on Virtual Machine Research And Technology Symposium, Berkeley, CA, USA, p. 3. USENIX Association (2004)"},{"key":"1_CR11","unstructured":"Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: Scalable secure file sharing on untrusted storage. In: FAST 2003: Proceedings of the 2nd USENIX Conference on File and Storage Technologies, Berkeley, CA, USA, pp. 29\u201342. USENIX Association (2003)"},{"issue":"11","key":"1_CR12","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/32.106971","volume":"17","author":"P.A. Karger","year":"1991","unstructured":"Karger, P.A., Zurko, M.E., Bonin, D.W., Mason, A.H., Kahn, C.E.: A retrospective on the vax vmm security kernel. IEEE Trans. Softw. Eng.\u00a017(11), 1147\u20131165 (1991)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"1_CR13","unstructured":"Kauer, B.: Oslo: Improving the security of trusted computing. In: Proceedings of the 16th USENIX Security Symposium (2007)"},{"key":"1_CR14","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1314354.1314368","volume-title":"STC 2007: Proceedings of the 2007 ACM workshop on Scalable trusted computing","author":"U. K\u00fchn","year":"2007","unstructured":"K\u00fchn, U., Selhorst, M., St\u00fcble, C.: Realizing property-based attestation and sealing with commonly available hard- and software. In: STC 2007: Proceedings of the 2007 ACM workshop on Scalable trusted computing, pp. 50\u201357. ACM, New York (2007)"},{"issue":"4","key":"1_CR15","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/138873.138874","volume":"10","author":"B. Lampson","year":"1992","unstructured":"Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: theory and practice. ACM Trans. Comput. Syst.\u00a010(4), 265\u2013310 (1992)","journal-title":"ACM Trans. Comput. Syst."},{"key":"1_CR16","volume-title":"Proceedings of TRUST2008 (these proceedings)","author":"J. Loeser","year":"2008","unstructured":"Loeser, J., England, P.: Para-virtualized tpm sharing. In: Proceedings of TRUST2008 (these proceedings), London, UK, Springer, Heidelberg (2008)"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/3-540-48184-2_32","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"R.C. Merkle","year":"1988","unstructured":"Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 369\u2013378. Springer, Heidelberg (1988)"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Mitchell, C.: Trusted Computing (Professional Applications of Computing) (Professional Applications of Computing). IEE (2005)","DOI":"10.1049\/PBPC006E"},{"key":"1_CR19","volume-title":"Trusted Computing Platforms: TCPA Technology in Context (HP Professional Series)","author":"S. Pearson","year":"2002","unstructured":"Pearson, S.: Trusted Computing Platforms: TCPA Technology in Context (HP Professional Series). Prentice Hall, Englewood Cliffs (2002)"},{"key":"1_CR20","first-page":"67","volume-title":"NSPW 2004: Proceedings of the 2004 workshop on New security paradigms","author":"A.-R. Sadeghi","year":"2004","unstructured":"Sadeghi, A.-R., St\u00fcble, C.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: NSPW 2004: Proceedings of the 2004 workshop on New security paradigms, pp. 67\u201377. ACM, New York (2004)"}],"container-title":["Lecture Notes in Computer Science","Trusted Computing - Challenges and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68979-9_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:30:47Z","timestamp":1605763847000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68979-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540689782","9783540689799"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68979-9_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}