{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T06:11:44Z","timestamp":1738131104442,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540786627"},{"type":"electronic","value":"9783540786634"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-78663-4_12","type":"book-chapter","created":{"date-parts":[[2008,3,8]],"date-time":"2008-03-08T06:00:01Z","timestamp":1204956001000},"page":"156-168","source":"Crossref","is-referenced-by-count":12,"title":["A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing"],"prefix":"10.1007","author":[{"given":"Kurt","family":"Dietrich","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Martin","family":"Pirker","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tobias","family":"Vejda","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ronald","family":"Toegl","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Thomas","family":"Winkler","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Peter","family":"Lipp","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: Proceedings of the 13 th USENIX Security Symposium, pp. 223\u2013238 (2004)"},{"key":"12_CR2","unstructured":"NTRU Cryptosystems, Inc. NTRU Core TCG Software Stack (CTSS) (2005), http:\/\/www.ntru.com\/products\/tcg_ss.htm"},{"key":"12_CR3","unstructured":"Stallman, R.: Can You Trust Your Computer (2007), http:\/\/www.gnu.org\/philosophy\/can-you-trust.html"},{"key":"12_CR4","unstructured":"Schneier, B.: Who Owns Your Computer (2007), http:\/\/www.schneier.com\/blog\/archives\/2006\/05\/who_owns_your_c.html"},{"key":"12_CR5","unstructured":"Baek, K.-Y., Ingersoll, W., Rotondo, S.A.: OpenSolaris Project: Trusted Platform Module Support (2007), http:\/\/www.opensolaris.org\/os\/project\/tpm\/"},{"key":"12_CR6","unstructured":"Kay, R.L.: Trusted Computing is Real and it\u2019s Here (2007), https:\/\/www.trustedcomputinggroup.org\/news\/Industry_Data\/Endpoint_Technologies_Associates_TCG_report_Jan_29_2007.pdf"},{"key":"12_CR7","unstructured":"Sarmenta, L., Rhodes, J., M\u00fcller, T.: TPM\/J Java-based API for the Trusted Platform Module (2007), http:\/\/projects.csail.mit.edu\/tc\/tpmj\/"},{"key":"12_CR8","unstructured":"Microsoft Developer Network. TPM Base Services (2007), http:\/\/msdn2.microsoft.com\/en-us\/library\/aa446796.aspx"},{"key":"12_CR9","unstructured":"TrouSerS - An Open-Source TCG Software Stack Implementation (2007), http:\/\/trousers.sourceforge.net\/"},{"key":"12_CR10","volume-title":"Trusted Platform Module Basics: Using TPM in Embedded Systems","author":"S. Kinney","year":"2006","unstructured":"Kinney, S.: Trusted Platform Module Basics: Using TPM in Embedded Systems. Elsevier, Burlington, MA, USA (2006)"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Sadeghi, A.-R., St\u00fcble, C.: Property-based Attestation for Computing Platforms: Caring about Policies, not Mechanisms. In: Proceedings of the New Security Paradigm Workshop (NSPW), pp. 67\u201377 (2004)","DOI":"10.1145\/1065907.1066038"},{"key":"12_CR12","unstructured":"Haldar, V., Chandra, D., Franz, M.: Semantic Remote Attestation - Virtual Machine Directed Approach to Trusted Computing. In: Proceedings of the 3rd Virtual Machine Research and Technology Symposium, pp. 29\u201341 (2004)"},{"key":"12_CR13","unstructured":"International Telecommunication Union. Generation and registration of Universally Unique Identifiers (UUIDs) and their use as ASN.1 object identifier components. ITU-T X.667 (2004), http:\/\/www.itu.int\/ITU-T\/studygroups\/com17\/oid\/X.667-E.pdf"},{"key":"12_CR14","unstructured":"Pirker, M., Winkler, T., Toegl, R.: Trusted Computing for the JavaTMPlatform (2007), http:\/\/trustedjava.sourceforge.net\/"},{"key":"12_CR15","unstructured":"Trusted Computing Group. TCG Software Stack Specification, Version 1.2 Errata A (2007), https:\/\/www.trustedcomputinggroup.org\/specs\/TSS\/"},{"key":"12_CR16","unstructured":"W3C. Simple Object Access Protocol (SOAP) 1.1, W3C Note (2000), http:\/\/www.w3.org\/TR\/2000\/NOTE-SOAP-20000508\/"},{"key":"12_CR17","unstructured":"Trusted Computing Group. TCG Infrastructure Specifications (2007), https:\/\/www.trustedcomputinggroup.org\/specs\/IWG"},{"key":"12_CR18","unstructured":"Trusted Computing Group (2007), https:\/\/www.trustedcomputinggroup.org"},{"key":"12_CR19","unstructured":"Selhost, M., St\u00fcble, C.: TrustedGRUB, Version 1.1 (2007), http:\/\/sourceforge.net\/projects\/trustedgrub"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Goldman, K., Perez, R., Sailer, R.: Linking remote attestation to secure tunnel endpoints. In: Proceedings of the first ACM workshop on Scalable Trusted Computing, pp. 21\u201324 (2006)","DOI":"10.1145\/1179474.1179481"},{"key":"12_CR21","unstructured":"Stumpf, F., Tafreschi, O., R\u00f6der, P., Eckert, C.: A Robust Integrity Reporting Protocol for Remote Attestation. In: Second Workshop on Advances in Trusted Computing (WATC 2006 Fall) (2006)"},{"key":"12_CR22","unstructured":"Trusted Computing Group. Trusted Network Connect (TNC) Specifications (2007), https:\/\/www.trustedcomputinggroup.org\/specs\/TNC\/"},{"key":"12_CR23","unstructured":"Trusted Computing Group. TCG Specification Architecture Overview, Revision 1.4 (2007), https:\/\/www.trustedcomputinggroup.org\/groups\/TCG_1_4_Architecture_Overview.pdf"}],"container-title":["Lecture Notes in Computer Science","Trustworthy Global Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78663-4_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T00:33:22Z","timestamp":1738110802000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-78663-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540786627","9783540786634"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78663-4_12","relation":{},"subject":[]}}