{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:11:38Z","timestamp":1764173498763},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540858843"},{"type":"electronic","value":"9783540858867"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85886-7_1","type":"book-chapter","created":{"date-parts":[[2008,9,17]],"date-time":"2008-09-17T12:45:42Z","timestamp":1221655542000},"page":"1-16","source":"Crossref","is-referenced-by-count":41,"title":["Property-Based TPM Virtualization"],"prefix":"10.1007","author":[{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"first","affiliation":[]},{"given":"Christian","family":"St\u00fcble","sequence":"additional","affiliation":[]},{"given":"Marcel","family":"Winandy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"1_CR1","first-page":"67","volume":"46","author":"N.G. Carr","year":"2005","unstructured":"Carr, N.G.: The end of corporate computing. MIT Sloan Management Review\u00a046(3), 67\u201373 (2005)","journal-title":"MIT Sloan Management Review"},{"key":"1_CR2","first-page":"2","volume-title":"Proceedings of the IEEE Symposium on Research in Security and Privacy","author":"P.A. Karger","year":"1990","unstructured":"Karger, P.A., Zurko, M.E., Bonin, D.W., Mason, A.H., Kahn, C.E.: A VMM security kernel for the VAX architecture. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 2\u201319. IEEE Computer Society, Los Alamitos (1990)"},{"unstructured":"Trusted Computing Group: TPM Main Specification Version 1.1b (February 2002), https:\/\/www.trustedcomputinggroup.org","key":"1_CR3"},{"unstructured":"Trusted Computing Group: TPM Main Specification Version 1.2 rev. 103 (July 2007), https:\/\/www.trustedcomputinggroup.org","key":"1_CR4"},{"unstructured":"Microsoft Corporation: Bitlocker drive encryption (July 2007), http:\/\/www.microsoft.com\/technet\/windowsvista\/security\/bitlockr.mspx","key":"1_CR5"},{"unstructured":"Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: 13th Usenix Security Symposium, San Diego, California (August 2004), pp. 223\u2013238 (2004)","key":"1_CR6"},{"unstructured":"Berger, S., Caceres, R., Goldman, K.A., Perez, R., Sailer, R., van Doorn, L.: vTPM: Virtualizing the Trusted Platform Module. In: Proceedings of the 15th USENIX Security Symposium, USENIX, August 2006, pp. 305\u2013320 (2006)","key":"1_CR7"},{"unstructured":"Goldman, K., Berger, S.: TPM Main Part 3 \u2013 IBM Commands (April 2005), http:\/\/www.research.ibm.com\/secure_systems_department\/projects\/vtpm\/mai%nP3IBMCommandsrev10.pdf","key":"1_CR8"},{"doi-asserted-by":"crossref","unstructured":"Scarlata, V., Rozas, C., Wiseman, M., Grawrock, D., Vishik, C.: TPM virtualization: Building a general framework. In: Pohlmann, N., Reimer, H. (eds.) Trusted Computing, Vieweg, pp. 43\u201356 (2007)","key":"1_CR9","DOI":"10.1007\/978-3-8348-9452-6_4"},{"issue":"8","key":"1_CR10","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1016\/S1389-1286(98)00019-X","volume":"31","author":"S.W. Smith","year":"1999","unstructured":"Smith, S.W., Weingart, S.: Building a high-performance, programmable secure coprocessor. Computer Networks\u00a031(8), 831\u2013860 (1999)","journal-title":"Computer Networks"},{"unstructured":"Yee, B.S.: Using Secure Coprocessors. PhD thesis, School of Computer Science, Carnegie Mellon University (May 1994) CMU-CS-94-149","key":"1_CR11"},{"key":"1_CR12","first-page":"65","volume-title":"Proceedings of the IEEE Symposium on Research in Security and Privacy","author":"W.A. Arbaugh","year":"1997","unstructured":"Arbaugh, W.A., Farber, D.J., Smith, J.M.: A secure and reliable bootstrap architecture. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1997, pp. 65\u201371. IEEE Computer Society Press, Los Alamitos (1997)"},{"unstructured":"Macdonald, R., Smith, S., Marchesini, J., Wild, O.: Bear: An open-source virtual secure coprocessor based on TCPA. Technical Report TR2003-471, Department of Computer Science, Dartmouth College (2003)","key":"1_CR13"},{"unstructured":"Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation: A virtual machine directed approach to trusted computing. In: USENIX Virtual Machine Research and Technology Symposium (2004)","key":"1_CR14"},{"doi-asserted-by":"crossref","unstructured":"Jiang, S., Smith, S., Minami, K.: Securing web servers against insider attack. In: 17th Annual Computer Security Applications Conference (ACSAC) (2001)","key":"1_CR15","DOI":"10.1109\/ACSAC.2001.991542"},{"key":"1_CR16","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1179474.1179479","volume-title":"STC 2006: Proceedings of the First ACM Workshop on Scalable Trusted Computing","author":"L. Chen","year":"2006","unstructured":"Chen, L., Landfermann, R., Loehr, H., Rohe, M., Sadeghi, A.R., St\u00fcble, C.: A protocol for property-based attestation. In: STC 2006: Proceedings of the First ACM Workshop on Scalable Trusted Computing, pp. 7\u201316. ACM Press, New York (2006)"},{"unstructured":"Poritz, J., Schunter, M., Van Herreweghen, E., Waidner, M.: Property attestation\u2014scalable and privacy-friendly security assessment of peer computers. Technical Report RZ 3548, IBM Research (May 2004)","key":"1_CR17"},{"key":"1_CR18","volume-title":"The 2004 New Security Paradigms Workshop","author":"A.R. Sadeghi","year":"2004","unstructured":"Sadeghi, A.R., St\u00fcble, C.: Property-based attestation for computing platforms: Caring about properties, not mechanisms. In: The 2004 New Security Paradigms Workshop. ACM Press, New York (2004)"},{"key":"1_CR19","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1314354.1314368","volume-title":"STC 2007: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing","author":"U. K\u00fchn","year":"2007","unstructured":"K\u00fchn, U., Selhorst, M., St\u00fcble, C.: Realizing property-based attestation and sealing with commonly available hard- and software. In: STC 2007: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, pp. 50\u201357. ACM Press, New York (2007)"},{"doi-asserted-by":"crossref","unstructured":"Goldman, K., Perez, R., Sailer, R.: Linking remote attestation to secure tunnel endpoints. In: STC 2006: Proceedings of the First ACM Workshop on Scalable Trusted Computing, pp. 21\u201324 (2006)","key":"1_CR20","DOI":"10.1145\/1179474.1179481"},{"unstructured":"Stumpf, F., Tafreschi, O., R\u00f6der, P., Eckert, C.: A robust integrity reporting protocol for remote attestation. In: Proceedings of the Second Workshop on Advances in Trusted Computing (WATC 2006 Fall), Tokyo (December 2006)","key":"1_CR21"},{"key":"1_CR22","series-title":"Lecture Notes in Computer Science","first-page":"53","volume-title":"Information Security","author":"N. Asokan","year":"2007","unstructured":"Asokan, N., Ekberg, J.E., Sadeghi, A.R., St\u00fcble, C., Wolf, M.: Enabling fairer digital rights management with trusted computing. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol.\u00a04779, pp. 53\u201370. Springer, Heidelberg (2007)"},{"doi-asserted-by":"crossref","unstructured":"Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Pratt, I., Warfield, A., Barham, P., Neugebauer, R.: Xen and the art of virtualization. In: Proceedings of the ACM Symposium on Operating Systems Principles, October 2003, pp. 164\u2013177 (2003)","key":"1_CR23","DOI":"10.1145\/1165389.945462"},{"unstructured":"Anderson, M.J., Moffie, M., Dalton, C.I.: Towards trustworthy virtualisation environments: Xen library os security service infrastructure. Technical Report HPL-2007-69, Hewlett-Packard Laboratories (April 2007)","key":"1_CR24"},{"issue":"9","key":"1_CR25","first-page":"548","volume":"28","author":"A.R. Sadeghi","year":"2004","unstructured":"Sadeghi, A.R., St\u00fcble, C., Pohlmann, N.: European multilateral secure computing base - open trusted computing for you and me. Datenschutz und Datensicherheit DuD, Verlag Friedrich Vieweg & Sohn, Wiesbaden\u00a028(9), 548\u2013554 (2004)","journal-title":"Datenschutz und Datensicherheit DuD, Verlag Friedrich Vieweg & Sohn, Wiesbaden"},{"unstructured":"Sailer, R., Valdez, E., Jaeger, T., Perez, R., van Doorn, L., Griffin, J.L., Berger, S.: sHype: Secure hypervisor approach to trusted virtualized systems. Technical Report RC23511, IBM Research Division (February 2005)","key":"1_CR26"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85886-7_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:35:56Z","timestamp":1606185356000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85886-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540858843","9783540858867"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85886-7_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}