{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:39:18Z","timestamp":1725500358450},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540775348"},{"type":"electronic","value":"9783540775355"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77535-5_11","type":"book-chapter","created":{"date-parts":[[2008,1,8]],"date-time":"2008-01-08T10:23:47Z","timestamp":1199787827000},"page":"142-156","source":"Crossref","is-referenced-by-count":0,"title":["An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks"],"prefix":"10.1007","author":[{"given":"Frederic","family":"Stumpf","sequence":"first","affiliation":[]},{"given":"Patrick","family":"R\u00f6der","sequence":"additional","affiliation":[]},{"given":"Claudia","family":"Eckert","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Gordon, L.A., Loeb, M.P., Lucyshyn, W., Richardson, R.: 2006 CSI\/FBI Computer Crime and Security Survey. Technical report, CSI (2006)"},{"key":"11_CR2","unstructured":"Group, T.C.: Trusted Platform Module (TPM) specifications. Technical report (2006), \n                    \n                      https:\/\/www.trustedcomputinggroup.org\/specs\/TPM"},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MC.1974.6323581","volume":"7","author":"R.P. Goldberg","year":"1974","unstructured":"Goldberg, R.P.: Survey of Virtual Machine Research. Computer\u00a07, 34\u201345 (1974)","journal-title":"Computer"},{"key":"11_CR4","unstructured":"Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: 13th USENIX Security Symposium, IBM T. J. Watson Research Center (2004)"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","volume-title":"ATC-2007. Proceedings of the 4th International Conference on Autonomic and Trusted Computing","author":"F. Stumpf","year":"2007","unstructured":"Stumpf, F., Benz, M., Hermanowski, M., Eckert, C.: An Approach to a Trustworthy System Architecture using Virtualization. In: ATC-2007. Proceedings of the 4th International Conference on Autonomic and Trusted Computing, Hong Kong, China. LNCS, Springer, Heidelberg (2007)"},{"key":"11_CR6","unstructured":"Base, E.M.S.C.: Towards trustworthy systems with open standards and trusted computing (2006), \n                    \n                      http:\/\/www.emscb.de\/"},{"key":"11_CR7","unstructured":"Fraser, K., Hand, S., Neugebauer, R., Pratt, I., Warfield, A., Williamson, M.: Safe Hardware Access with the Xen Virtual Machine Monitor. In: 1st Workshop on Operating System and Architectural Support for the on demand IT InfraStructure (OASIS) (2004)"},{"key":"11_CR8","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/32.106971","volume":"17","author":"P.A. Karger","year":"1991","unstructured":"Karger, P.A., Zurko, M.E., Bonin, D.W., Mason, A.H., Kahn, C.E.: A Retrospective on the VAX VMM Security Kernel. IEEE Trans. Softw. Eng.\u00a017, 1147\u20131165 (1991)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"11_CR9","unstructured":"Stumpf, F., Tafreschi, O., R\u00f6der, P., Eckert, C.: A Robust Integrity Reporting Protocol for Remote Attestation. In: Second Workshop on Advances in Trusted Computing (WATC 2006 Fall) (2006)"},{"key":"11_CR10","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1145\/945445.945464","volume-title":"SOSP 2003. Proceedings of the nineteenth ACM symposium on Operating systems principles","author":"T. Garfinkel","year":"2003","unstructured":"Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: a virtual machine-based platform for trusted computing. In: SOSP 2003. Proceedings of the nineteenth ACM symposium on Operating systems principles, pp. 193\u2013206. ACM Press, New York (2003)"},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1145\/224056.224075","volume-title":"SOSP 1995. Proceedings of the fifteenth ACM symposium on Operating systems principles","author":"J. Liedtke","year":"1995","unstructured":"Liedtke, J.: On Micro-Kernel Construction. In: SOSP 1995. Proceedings of the fifteenth ACM symposium on Operating systems principles, pp. 237\u2013250. ACM Press, New York (1995)"},{"key":"11_CR12","unstructured":"Sadeghi, A.R., Scheibel, M., St\u00fcble, C., Wolf, M.: Play it once again, sam - enforcing stateful licenses on open platforms. In: 2nd Workshop on Advances in Trusted Computing (WATC 2006 Fall) (2006)"},{"key":"11_CR13","first-page":"31","volume-title":"DRM 2004. Proceedings of the 4th ACM workshop on Digital rights management","author":"Y. Yu","year":"2004","unstructured":"Yu, Y., Chiueh, T.: Display-Only File Server: A Solution against Information Theft Due to Insider Attack. In: DRM 2004. Proceedings of the 4th ACM workshop on Digital rights management, pp. 31\u201339. ACM Press, New York (2004)"},{"key":"11_CR14","unstructured":"Kuhlmann, D., Landfermann, R., Ramasamy, H., Schunter, M., Ramunno, G., Vernizzi, D.: An open trusted computing architecture - secure virtual machines enabling user-defined policy enforcement. Technical report, Open Trusted Computing consortium (OpenTC) (2007)"},{"key":"11_CR15","unstructured":"R\u00f6der, P., Stumpf, F., Grewe, R., Eckert, C.: Hades - Hardware Assisted Document Security. In: Second Workshop on Advances in Trusted Computing (WATC 2006 Fall), Tokyo, Japan (2006)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77535-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T13:51:18Z","timestamp":1551361878000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77535-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540775348","9783540775355"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77535-5_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}