{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:12:10Z","timestamp":1725491530227},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540729112"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72912-9_15","type":"book-chapter","created":{"date-parts":[[2007,9,12]],"date-time":"2007-09-12T09:20:17Z","timestamp":1189588817000},"page":"441-469","source":"Crossref","is-referenced-by-count":6,"title":["ws-Attestation: Enabling Trusted Computing on Web Services"],"prefix":"10.1007","author":[{"given":"Sachiko","family":"Yoshihama","sequence":"first","affiliation":[]},{"given":"Tim","family":"Ebringer","sequence":"additional","affiliation":[]},{"given":"Megumi","family":"Nakamura","sequence":"additional","affiliation":[]},{"given":"Seiji","family":"Munetoh","sequence":"additional","affiliation":[]},{"given":"Takuya","family":"Mishina","sequence":"additional","affiliation":[]},{"given":"Hiroshi","family":"Maruyama","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"W.A. Arbaugh, J. Farber, and J.M. Smith. A secure and reliable bootstrap architecture. In IEEE Computer Society Conference on Security and Privacy, pp. 65\u201371, 1997.","DOI":"10.1109\/SECPRI.1997.601317"},{"key":"15_CR2","unstructured":"BM, BEA Systems, Microsoft, SAP AG, Sonic Software, and VeriSign. Web services policy framework (ws-policy), Sep 2004."},{"key":"15_CR3","unstructured":"Cert\/cc statistics 1988-2005. Accessed 2005. http:\/\/www.cert.org\/stats\/cert_stats.html."},{"key":"15_CR4","unstructured":"IBM et al. Web services secure conversation language (ws-secureconversation), Feb 2005."},{"key":"15_CR5","unstructured":"IBM et al. Web services trust language (ws-trust), Feb 2005."},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In 19th ACM Symposium on Operating Systems Principles, 2003.","DOI":"10.1145\/945445.945464"},{"key":"15_CR7","unstructured":"John L. Griffin, Trent Jaeger, Ronald Perez, Reiner Sailer, Leendert van Doorn, and Ramon Caceres. Trusted virtual domains: Toward secure distributed services. In Workshop on Hot Topics in System Dependability, 2005."},{"key":"15_CR8","unstructured":"V. Haldar, D. Chandra, and M. Franz. Semantic remote attestation \u2014 a virtual machine directed approach to trusted computing. In 3rd Virtual Machine Research and Technology Symposium, May 2004."},{"key":"15_CR9","unstructured":"IBM. Web services federation language (ws-federation), Jul 2003."},{"key":"15_CR10","unstructured":"IBM, Microsoft, RSA Security, and VeriSign. Web services security policy language (ws-securitypolicy)."},{"key":"15_CR11","unstructured":"IBM, BEA Systems, Microsoft, SAP AG, Computer Associates, Sun Microsystems, and webMethods. Web services metadata exchange (ws-metadataexchange), Sep 2004. http:\/\/www-128.ibm.com\/developerworks\/library\/specification\/ws-mex\/."},{"key":"15_CR12","unstructured":"IBM, BEA Systems, Microsoft, Arjuna, and Hitachi. Web services transactions specifications, Nov 2004."},{"key":"15_CR13","unstructured":"Microsoft IBM. Security in a web services world: A proposed architecture and roadmap, Apr 2002. http:\/\/www-128.ibm.com\/developerworks\/library\/specification\/ws-secmap\/."},{"key":"15_CR14","unstructured":"Ibm service management framework. http:\/\/www-306.ibm.com\/software\/wireless\/smf\/."},{"key":"15_CR15","unstructured":"Java cryptography extension (jce). http:\/\/java.sun.com\/products\/jce\/."},{"key":"15_CR16","unstructured":"Linux intrusion detection system (lids). http:\/\/www.lids.org\/."},{"key":"15_CR17","unstructured":"Open vulnerability and assessment language. http:\/\/oval.mitre.org\/."},{"key":"15_CR18","unstructured":"OSGi alliance. http:\/\/www.osgi.org\/."},{"key":"15_CR19","unstructured":"W3C Recommendation. Soap version 1.2, Jun 2004. http:\/\/www.w3.org\/TR\/soap\/."},{"key":"15_CR20","unstructured":"W3C Candidate Recommendation. Web services description language (wsdl) version 2.0 part 0: Primer, Mar 2006. http:\/\/www.w3.org\/TR\/2006\/CR-wsdl20-primer-20060327\/."},{"key":"15_CR21","unstructured":"Redhat enterprise linux. http:\/\/www.redhat.com\/."},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"A. Sadeghi and C. St\u00fcble. Property-based attestation for computing platforms: Caring about properties, not mechanisms. In 2004 Workshop on New Security Paradigms (NSPW 2004), pages 67\u201377, 2004.","DOI":"10.1145\/1065907.1066038"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"R. Sailer, T. Jaeger, X. Zhang, and L. Van Doorn. Attestation-based policy enforcement for remote access. In 11th ACM Conference on Computer and Communications Security, pages 308\u2013317, Oct 2004.","DOI":"10.1145\/1030083.1030125"},{"key":"15_CR24","unstructured":"R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a tcg-based integrity measurement architecture. In 13th USENIX Security Symposium, pages 223\u2013238, Aug 2004."},{"key":"15_CR25","unstructured":"Tcg software stack specification version 1.2. http:\/\/www.trustedcomputing.org\/specs\/TSS."},{"key":"15_CR26","unstructured":"Tcg specification architecture overview, revision 1.2. Trusted Computing Group, Apr 2004. Available at https:\/\/www.trustedcomputinggroup.org\/groups\/TCG_1_0_Architecture_Overview.pdf."},{"key":"15_CR27","unstructured":"Trusted computing platform alliance main specification, version 1.1b. Trusted Computing Group, Feb 2002. https:\/\/www.trustedcomputinggroup.org\/specs\/TPM."},{"key":"15_CR28","unstructured":"Uddi spec technical committee draft, version 3.02, Oct 2004. http:\/\/www.oasis-open.org\/."},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, , and Hiroshi Maruyama. Bridging the gap between inter-communication boundary and inside trusted components. In 11th European Symposium on Research in Computer Security(ESORICS 2006), LNCS. Springer, 2006.","DOI":"10.1007\/11863908_5"},{"key":"15_CR30","unstructured":"Web service security: Soap messaging security 1.0 (ws-security 2004). OASIS Standard 200401, Mar 2004."}],"container-title":["Test and Analysis of Web Services"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72912-9_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T09:51:22Z","timestamp":1619517082000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72912-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540729112"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72912-9_15","relation":{},"subject":[]}}