{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:04:43Z","timestamp":1725516283315},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540689782"},{"type":"electronic","value":"9783540689799"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-68979-9_11","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T08:02:26Z","timestamp":1218528146000},"page":"143-154","source":"Crossref","is-referenced-by-count":1,"title":["Trusted Computing Serving an Anonymity Service"],"prefix":"10.1007","author":[{"given":"Alexander","family":"B\u00f6ttcher","sequence":"first","affiliation":[]},{"given":"Bernhard","family":"Kauer","sequence":"additional","affiliation":[]},{"given":"Hermann","family":"H\u00e4rtig","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Project: AN.ON - Anonymity, \n                    \n                      http:\/\/anon.inf.tu-dresden.de"},{"key":"11_CR2","unstructured":"MixOnCD: AN.ON Live-CD, \n                    \n                      http:\/\/anon.inf.tu-dresden.de\/operators\/help\/mixsetupLiveCD_deployment_en.html"},{"key":"11_CR3","unstructured":"Anonymisier-Dienst JAP ist wieder anonym, \n                    \n                      http:\/\/www.heise.de\/newsticker\/meldung\/39813"},{"key":"11_CR4","unstructured":"BKA-Vorgehen gegen Anonymisierdienst JAP rechtswidrig, \n                    \n                      http:\/\/www.heise.de\/newsticker\/meldung\/41690"},{"key":"11_CR5","unstructured":"JAP, die Macher und die nicht mehr so ganz garantierte Anonymitt, \n                    \n                      http:\/\/www.heise.de\/newsticker\/meldung\/39531"},{"key":"11_CR6","unstructured":"Nicht mehr ganz anonym: Anonymisier-Dienst JAP protokolliert Zugriffe, \n                    \n                      http:\/\/www.heise.de\/newsticker\/meldung\/39508"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Arbaugh, W.A., Farber, D.J., Smith, J.M.: A secure and reliable bootstrap architecture. In: 1997 IEEE Symposium on Security and Privacy, Oakland, CA, May 1997, pp. 65\u201371 (1997)","DOI":"10.1109\/SECPRI.1997.601317"},{"issue":"2","key":"11_CR8","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D.L. Chaum","year":"1981","unstructured":"Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM\u00a024(2), 84\u201390 (1981)","journal-title":"Commun. ACM"},{"key":"11_CR9","unstructured":"Feske, N., Helmuth, C.: Design of the Bastei OS architecture. Technical Report TUD-FI06-07-Dezember-2006, TU Dresden (2006)"},{"key":"11_CR10","unstructured":"Garriss, S., C\u00e1ceres, R., Berger, S., Sailer, R., van Doorn, L., Zhang, X.: Towards trustworthy kiosk computing. In: Mobile Computing Systems and Applications, 2007. HotMobile 2007, March 2007, pp. 41\u201345 (2007)"},{"issue":"2","key":"11_CR11","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/293411.293443","volume":"42","author":"D. Goldschlag","year":"1999","unstructured":"Goldschlag, D., Reed, M., Syverson, P.: Onion routing. Commun. ACM\u00a042(2), 39\u201341 (1999)","journal-title":"Commun. ACM"},{"key":"11_CR12","unstructured":"Grawrock, D.: The Intel Safer Computing Initiative, January 2006. Intel Press (2006)"},{"key":"11_CR13","volume-title":"Verl\u00e4s\u0308liche Informationssysteme, Tagungsband, Informatikfachberichte 271","author":"M. Gross","year":"1991","unstructured":"Gross, M.: Vertrauensw\u00fcrdiges Booten als Grundlage authentischer Basissysteme. In: Verl\u00e4s\u0308liche Informationssysteme, Tagungsband, Informatikfachberichte 271. Springer, Heidelberg (1991)"},{"key":"11_CR14","unstructured":"H\u00e4rtig, H., Hohmuth, M., Feske, N., Helmuth, C., Lackorzynski, A., Mehnert, F., Peter, M.: The nizza secure-system architecture. In: CollaborateCom (2005)"},{"key":"11_CR15","unstructured":"Bumler, C.G.H., Federrath, H.: Report on the proceedings by criminal prosecution authorities against the project an on anonymity online (2003)"},{"key":"11_CR16","unstructured":"Kauer, B.: OSLO: Improving the Security of Trusted Computing. In: 16th USENIX Security Symposium, pp. 229\u2013237."},{"issue":"4","key":"11_CR17","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/138873.138874","volume":"10","author":"B. Lampson","year":"1992","unstructured":"Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems\u00a010(4), 265\u2013310 (1992)","journal-title":"ACM Transactions on Computer Systems"},{"key":"11_CR18","unstructured":"McCune, J.M., Parno, B., Perrig, A., Reiter, M.K., Isozaki, H.: An Execution Infrastructure for TCB Minimization. Technical Report CMU-CyLab-07-018, Carnegie Mellon University (December 2007)"},{"key":"11_CR19","unstructured":"OSLO - Open Secure LOader, \n                    \n                      http:\/\/os.inf.tu-dresden.de\/~kauer\/oslo"},{"volume-title":"Trusted Computing Platforms","year":"2002","key":"11_CR20","unstructured":"Pearson, S. (ed.): Trusted Computing Platforms. Prentice Hall International, Englewood Cliffs (2002)"},{"key":"11_CR21","unstructured":"Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a tcg-based integrity measurement architecture. In: SSYM 2004: Proceedings of the 13th conference on USENIX Security Symposium, Berkeley, CA, USA, p. 16. USENIX Association (2004)"},{"key":"11_CR22","unstructured":"Singaravelu, L., Kauer, B., Boettcher, A., H\u00e4rtig, H., Pu, C., Jung, G., Weinhold, C.: Enforcing configurable trust in client-side software stacks by splitting information flow. Technical Report GIT-CERCS-07-11, Georgia Institute of Technology, Atlanta, GA (May 2007)"},{"issue":"4","key":"11_CR23","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1145\/1218063.1217951","volume":"40","author":"L. Singaravelu","year":"2006","unstructured":"Singaravelu, L., Pu, C., H\u00e4rtig, H., Helmuth, C.: Reducing tcb complexity for security-sensitive applications: three case studies. SIGOPS Oper. Syst. Rev.\u00a040(4), 161\u2013174 (2006)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"11_CR24","unstructured":"Ta-Min, R., Litty, L., Lie, D.: Splitting interfaces: making trust between applications and operating systems configurable. In: OSDI 2006: Proceedings of the 7th symposium on Operating systems design and implementation, Berkeley, CA, USA, November 2006, pp. 279-292. USENIX Association (2006)"},{"key":"11_CR25","unstructured":"TCG: Trusted Computing Group, \n                    \n                      https:\/\/www.trustedcomputinggroup.org"},{"key":"11_CR26","unstructured":"Embassy leaks highlight pitfalls of Tor, \n                    \n                      http:\/\/www.securityfocus.com\/news\/11486"}],"container-title":["Lecture Notes in Computer Science","Trusted Computing - Challenges and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68979-9_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:21:24Z","timestamp":1620001284000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68979-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540689782","9783540689799"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68979-9_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}