{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:12:19Z","timestamp":1773843139226,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642041167","type":"print"},{"value":"9783642041174","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04117-4_32","type":"book-chapter","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T16:44:00Z","timestamp":1266857040000},"page":"697-717","source":"Crossref","is-referenced-by-count":6,"title":["Trusted Computing"],"prefix":"10.1007","author":[{"given":"Antonio","family":"Lioy","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gianluca","family":"Ramunno","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"32_CR1","volume-title":"Trusted Computer Systems Evaluation Criteria (Orange Book)","author":"U.S. Department of Defense","year":"1985","unstructured":"U.S.\u00a0Department of Defense: Trusted Computer Systems Evaluation Criteria (Orange Book) (National Computer Security Center, Fort Meade 1985)"},{"key":"32_CR2","volume-title":"Trust in Cyberspace","year":"1998","unstructured":"F.B.\u00a0Schneider (Ed.): Trust in Cyberspace (National Academy Press, Washington 1998)"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"R. Shirey: RFC 4949 \u2013 Internet Security Glossary, Version 2 (IETF, 2007)","DOI":"10.17487\/rfc4949"},{"key":"32_CR4","volume-title":"Security Engineering: a Guide to Building Dependable Distributed Systems","author":"R. Anderson","year":"2008","unstructured":"R.\u00a0Anderson: Security Engineering: a Guide to Building Dependable Distributed Systems (John Wiley and Sons, Indianapolis 2008)"},{"key":"32_CR5","unstructured":"P.G. Neumann: Architectures and formal representations for secure systems, SRI Project 6401, Deliverable A002 (Computer Science Laboratory, SRI International, 1995)"},{"key":"32_CR6","volume-title":"Glossary of Computer Security Terms (Aqua Book)","author":"U.S. Department of Defense","year":"1990","unstructured":"U.S.\u00a0Department of Defense: Glossary of Computer Security Terms (Aqua Book) (National Computer Security Center, Fort Meade 1990)"},{"key":"32_CR7","unstructured":"Trusted Computing Group: TCG glossary, available at https:\/\/www.trustedcomputinggroup.org\/developers\/glossary\/"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"C.J. Mitchell: Trusted Computing (Institution of Engineering and Technology, 2005)","DOI":"10.1049\/PBPC006E"},{"key":"32_CR9","unstructured":"T. Jaeger, R. Sailer, X. Zhang: Analyzing integrity protection in the SELinux example policy, Proc. 12th USENIX Security Symposium, Washington (2003) pp. 59\u201374"},{"key":"32_CR10","unstructured":"P. Kuliniewicz: SENG: an enhanced policy language for SELinux, Proc. SELinux Symposium and Developer Summit, Baltimore (2006)"},{"key":"32_CR11","unstructured":"KernelTrap: SELinux vs. OpenBSD\u2019s default security, available at http:\/\/kerneltrap.org\/OpenBSD\/SELinux_vs_OpenBSDs_Default_Security (2007)"},{"key":"32_CR12","unstructured":"J. Loftus: With RHEL 5, Red Hat goes to bat for SELinux, available at http:\/\/searchenterpriselinux.techtarget.com\/news\/article\/0,289142,sid39 _gci1259697,00.html (2007)"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"P.G. Neumann: Achieving principled assuredly trustworthy composable systems and networks, Proc. DISCEX, Washington (2003) pp. 182\u2013187","DOI":"10.1109\/DISCEX.2003.1194962"},{"key":"32_CR14","unstructured":"The Fiasco: requirements definition, TU Dresden, Report TUD-FI98-12, available at http:\/\/os.inf.tu-dresden.de\/paper_ps\/fiasco-spec.ps.gz (December 1998)"},{"key":"32_CR15","unstructured":"DARPA: The composable high-assurance trustworthy systems (CHATS) project, http:\/\/www.csl.sri.com\/users\/neumann\/chats.html (2004)"},{"key":"32_CR16","unstructured":"The European Multilaterally Secure Computing Base (EMSCB) project \u2013 towards trustworthy systems with open standards and trusted computing, http:\/\/www.emscb.de"},{"key":"32_CR17","unstructured":"D.\u00a0Kuhlmann, R.\u00a0Landfermann, H.V.\u00a0Ramasamy, M.\u00a0Schunter, G.\u00a0Ramunno, D.\u00a0Vernizzi: An open trusted computing architecture \u2013 secure virtual machines enabling user-defined policy enforcement, IBM Research Report RZ 3655 (2006)"},{"key":"32_CR18","unstructured":"H. L\u00f6hr, A. Sadeghi, C. St\u00fcble, M. Weber, M. Winandy: Modeling trusted computing support in a protection profile for high assurance security kernels, Proc. TRUST-2009, Oxford (2009) pp. 45\u201362"},{"key":"32_CR19","unstructured":"BSI and Sirrix AG security technologies: Protection profile for a high-security kernel (HASK-PP), v. 1.14 (2008)"},{"issue":"1","key":"32_CR20","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1145\/1353534.1346285","volume":"36","author":"J.M. McCune","year":"2008","unstructured":"J.M.\u00a0McCune, B.\u00a0Parno, A.\u00a0Perrig, M.K.\u00a0Reiter, A.\u00a0Seshadri: How low can you go? Recommendations for hardware-supported minimal TCB code execution, SIGARCH Comput. Archit. News 36(1), 14\u201325 (2008)","journal-title":"Archit. News"},{"key":"32_CR21","unstructured":"Trusted Computing Group: TCG specification architecture overview, Revision 1.4 (2007)"},{"key":"32_CR22","unstructured":"Intel: Intel trusted execution technology (TXT), Measured Launched Environment Developer\u2019s Guide, Document Number: 315168-005 (2008)"},{"key":"32_CR23","unstructured":"AMD: AMD64 virtualization codenamed \u201cPacifica\u201d technology, Secure Virtual Machine Architec ture Reference Manual, Publication No.\u00a033047, Revision 3.01 (2005)"},{"key":"32_CR24","unstructured":"AMD: AMD I\/O virtualization technology (IOMMU) specification, Publication No. 34434, Revision 1.26 (2009)"},{"key":"32_CR25","unstructured":"D. Grawrock: Dynamics of a\u00a0trusted platform (Intel Press, 2008)"},{"key":"32_CR26","unstructured":"Trusted Computing Group: TCG TPM main Part 1 design principles, Version 1.2 Level 2 Revision 103 (2007)"},{"key":"32_CR27","unstructured":"Trusted Computing Group: TCG TPM main Part 2 TPM structures, Version 1.2 Level 2 Revision 103 (2007)"},{"key":"32_CR28","unstructured":"Trusted Computing Group: TCG TPM main Part 3 commands, Version 1.2 Level 2 Revision 103 (2007)"},{"key":"32_CR29","unstructured":"J. Jonsson, B. Kaliski: RFC-3447 \u2013 PKCS #1: RSA cryptography standard, IETF (2002)"},{"key":"32_CR30","unstructured":"Trusted Computing Group: TCG PC client specific implementation specification for conventional BIOS, Version 1.2 Final Revision 1.00 (2005)"},{"key":"32_CR31","unstructured":"Trusted Computing Group: TCG PC client specific TPM interface specification (TIS), Version 1.2 Final Revision 1.00 (2005)"},{"key":"32_CR32","unstructured":"Trusted Computing Group: TCG Infrastructure Working Group (IWG) subject key attestation evidence extension, Version 1.0 Revision 7 (2005)"},{"key":"32_CR33","doi-asserted-by":"crossref","unstructured":"F. Armknecht, Y. Gasmi, A.R. Sadeghi, P. Stewin, M. Unger, G. Ramunno, D. Vernizzi: An efficient implementation of trusted channels based on OpenSSL, Proc. 3rd ACM workshop on Scalable Trusted Computing, Fairfax (2008) pp. 41\u201350","DOI":"10.1145\/1456455.1456462"},{"key":"32_CR34","doi-asserted-by":"crossref","unstructured":"E. Brickell, J. Camenisch, L. Chen: Direct anonymous attestation, Proc. 11th ACM Conf. on Computer and Communications Security, Washington (2004) pp. 132\u2013145","DOI":"10.1145\/1030083.1030103"}],"container-title":["Handbook of Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04117-4_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:39:27Z","timestamp":1606185567000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04117-4_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642041167","9783642041174"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04117-4_32","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}