{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T08:28:09Z","timestamp":1725524889079},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642005862"},{"type":"electronic","value":"9783642005879"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00587-9_2","type":"book-chapter","created":{"date-parts":[[2009,2,17]],"date-time":"2009-02-17T10:45:02Z","timestamp":1234867502000},"page":"14-28","source":"Crossref","is-referenced-by-count":6,"title":["ACPI: Design Principles and Concerns"],"prefix":"10.1007","author":[{"given":"Lo\u00efc","family":"Duflot","sequence":"first","affiliation":[]},{"given":"Olivier","family":"Levillain","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Morin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"ACPI\u00a0Component Architecture. Unix format test suite (2008), http:\/\/www.acpica.org\/downloads"},{"key":"2_CR2","unstructured":"Devices, A.M.: Amd64 virtualization: Secure virtual machine architecture reference manual (2005)"},{"key":"2_CR3","unstructured":"Duflot, L., Etiemble, D., Grumelard, O.: Security Issues Related to Pentium System Management Mode. In: CanSecWest Security Conference Core 2006 (2006)"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Embleton, S., Sparks, S.: The System Management Mode (SMM) Rootkit. In: Black Hat Briefings (2008)","DOI":"10.1145\/1460877.1460892"},{"key":"2_CR5","unstructured":"Grawrock, D.: The intel safer computing initiative (2007)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Heasman, J.: Implementing and detecting an acpi bios rootkit. In: Blackhat federal 2006 (2006), www.blackhat.com\/presentations\/bh-federal-06\/BH-Fed-06-Heasman.pdf","DOI":"10.1016\/S1353-4858(06)70326-9"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Heiser, G., Elphinstone, K., Kuz, I., Klein, G., Petters, S.: Towards trustworthy computing systems: taking microkernel to the next level. In: ACM operating systems review (2007)","DOI":"10.1145\/1278901.1278904"},{"key":"2_CR8","unstructured":"Hewlett-Packard: Intel, Microsoft, Phoenix, and Toshiba. The acpi specification: revision 3.0b (2008), http:\/\/www.acpi.info\/spec.htm"},{"key":"2_CR9","unstructured":"Intel Corp. Intel 82845 Memory Controller Hub (MCH) Datasheet (2002)"},{"key":"2_CR10","unstructured":"Intel Corp. Intel 64 and IA 32 Architectures Software Developer\u2019s Manual Volume 1: Basic architecture (2007)"},{"key":"2_CR11","unstructured":"Intel Corp. Intel 64 and ia 32 architectures software developer\u2019s manual volume 2a: instruction set reference, a-m (2007), http:\/\/www.intel.com\/design\/processor\/manuals\/253666.pdf"},{"key":"2_CR12","unstructured":"Intel Corp. Intel 64 and IA 32 Architectures Software Developer\u2019s Manual Volume 2B: Instruction Set Reference, N-Z (2007)"},{"key":"2_CR13","unstructured":"Intel Corp. Intel 64 and IA 32 Architectures Software Developer\u2019s Manual Volume 3A: System Programming Guide Part 1 (2007)"},{"key":"2_CR14","unstructured":"Intel Corp. Intel I\/O Controller Hub 9 (ICH9) Family Datasheet (2008)"},{"key":"2_CR15","unstructured":"Mandriva. Mandriva linux one (2008), http:\/\/www.mandriva.com\/en\/product\/mandriva-linux-one"},{"key":"2_CR16","unstructured":"Microsoft and Intel. Advanced power management v1.2 specification (1996), www.microsoft.com\/whdc\/archive\/amp_12.mspx"},{"key":"2_CR17","unstructured":"PCI-SIG. Pci local bus specification, revision 2.1. (1995)"},{"key":"2_CR18","unstructured":"Trusted Computing Group. Tpm specification version 1.2: Design principles (2008), https:\/\/www.trustedcomputinggroup.org\/specs\/TPM\/MainP1DPrev103.zip"}],"container-title":["Lecture Notes in Computer Science","Trusted Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00587-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T01:43:53Z","timestamp":1684892633000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00587-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642005862","9783642005879"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00587-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}