{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T00:10:02Z","timestamp":1739319002772,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044731"},{"type":"electronic","value":"9783642044748"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04474-8_29","type":"book-chapter","created":{"date-parts":[[2009,9,3]],"date-time":"2009-09-03T11:26:09Z","timestamp":1251977169000},"page":"363-378","source":"Crossref","is-referenced-by-count":6,"title":["Hardware-Assisted Application-Level Access Control"],"prefix":"10.1007","author":[{"given":"Yu-Yuan","family":"Chen","sequence":"first","affiliation":[]},{"given":"Ruby B.","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","unstructured":"Graubart, R.: On The Need for A Third Form of Access Control. In: 12th National Computer Security Conference Proceedings, October 1989, pp. 296\u2013303 (1989)"},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"McCollum, C.J., Messing, J.R., Notargiacomo, L.: Beyond the Pale of MAC and DAC \u2013 Defining New Forms of Access Control. In: IEEE Computer Society Symposium on Research in Security and Privacy, pp. 190\u2013200 (1990)","DOI":"10.1109\/RISP.1990.63850"},{"key":"29_CR3","unstructured":"Advanced Access Content System (AACS), http:\/\/www.aacsla.com\/home"},{"key":"29_CR4","unstructured":"Content Scramble System (CSS), http:\/\/www.dvdcca.org\/css\/"},{"key":"29_CR5","unstructured":"Leyden, J.: Blu-ray DRM Defeated: Copy-protection Cracked Again (January 23, 2007), http:\/\/www.theregister.co.uk\/2007\/01\/23\/blu-ray_drm_cracked\/"},{"key":"29_CR6","unstructured":"Trusted Computing Group: Trusted Platform Module, https:\/\/www.trustedcomputinggroup.org\/home"},{"key":"29_CR7","unstructured":"Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest We Remember: Cold Boot Attacks on Encryption Keys. In: SS 2008: Proceedings of the 17th Conference on Security Symposium, Berkeley, CA, USA, pp. 45\u201360. USENIX Association (2008)"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Kumar, A.: Discovering Passwords in the Memory, White Paper, Paladion Networks (November 2003)","DOI":"10.1016\/S1353-4858(03)00108-9"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Dwoskin, J.S., Lee, R.B.: Hardware-rooted Trust for Secure Key Management and Transient Trust. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS 2007), October 2007, pp. 389\u2013400 (2007)","DOI":"10.1145\/1315245.1315294"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Lee, R.B., Kwan, P.C.S., McGregor, J.P., Dwoskin, J., Wang, Z.: Architecture for Protecting Critical Secrets in Microprocessors. In: ISCA 2005: Proceedings of the 32nd Intl. Symposium on Computer Architecture, pp. 2\u201313 (2005)","DOI":"10.1109\/ISCA.2005.14"},{"key":"29_CR11","unstructured":"Challener, D., Yoder, K., Catherman, R., Safford, D.: 15. In: A Practical Guide to Trusted Computing, pp. 271\u2013276. IBM Press (2008)"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Epstein, J.: Fifteen Years after TX: A Look Back at High Assurance Multi-Level Secure Windowing. In: ACSAC 2006, pp. 301\u2013320 (2006)","DOI":"10.1109\/ACSAC.2006.28"},{"key":"29_CR13","unstructured":"Ocheltree, K., Millman, S., Hobbs, D., Mcdonnell, M., Nieh, J., Baratto, R.: Net2Display: A Proposed VESA Standard for Remoting Displays and I\/O Devices over Networks. In: Proceedings of the 2006 Americas Display Engineering and Applications Conference (ADEAC 2006) (October 2006)"},{"key":"29_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-76900-2_11","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"A. Kiayias","year":"2007","unstructured":"Kiayias, A., Tsiounis, Y., Yung, M.: Group Encryption. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 181\u2013199. Springer, Heidelberg (2007)"},{"key":"29_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1007\/BFb0052252","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"J. Camenisch","year":"1997","unstructured":"Camenisch, J., Stadler, M.: Efficient Group Signature Schemes for Large Groups (Extended Abstract). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 410\u2013424. Springer, Heidelberg (1997)"},{"key":"29_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"D. Chaum","year":"1991","unstructured":"Chaum, D., van Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 257\u2013265. Springer, Heidelberg (1991)"},{"key":"29_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/BFb0053433","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"L. Chen","year":"1995","unstructured":"Chen, L., Pedersen, T.P.: New Group Signature Schemes. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 171\u2013181. Springer, Heidelberg (1995)"},{"key":"29_CR18","unstructured":"The Traditional vi, http:\/\/ex-vi.sourceforge.net\/"},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Kohl, U., Lotspiech, J., Nusser, S.: Security for the Digital Library - Protectiong Documents Rather Than Channels. In: DEXA 1998: Proceedings of the 9th International Workshop on Database and Expert Systems Applications, p. 316 (1998)","DOI":"10.1109\/DEXA.1998.707419"},{"key":"29_CR20","unstructured":"Adobe Acrobat Family, http:\/\/www.adobe.com\/products\/acrobat"},{"key":"29_CR21","unstructured":"Secure Information Sharing Architecture (SISA) Alliance (2007), http:\/\/www.sisaalliance.com\/"},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"Lie, D., Thekkath, C.A., Horowitz, M.: Implementing an Untrusted Operating System on Trusted Hardware. In: SOSP 2003: Proceedings of the nineteenth ACM symposium on Operating systems principles, pp. 178\u2013192 (2003)","DOI":"10.1145\/945445.945463"},{"key":"29_CR23","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1145\/1352592.1352625","volume-title":"Eurosys 2008: Proceedings of the 3rd ACM SIGOPS\/EuroSys European Conference on Computer Systems 2008","author":"J.M. McCune","year":"2008","unstructured":"McCune, J.M., Parno, B.J., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: an execution infrastructure for tcb minimization. In: Eurosys 2008: Proceedings of the 3rd ACM SIGOPS\/EuroSys European Conference on Computer Systems 2008, pp. 315\u2013328. ACM, New York (2008)"},{"key":"29_CR24","doi-asserted-by":"crossref","unstructured":"Chen, X., Garfinkel, T., Lewis, E.C., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., Dwoskin, J., Ports, D.R.: Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. In: ASPLOS XIII, pp. 2\u201313 (2008)","DOI":"10.1145\/1346281.1346284"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04474-8_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T23:42:15Z","timestamp":1739317335000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04474-8_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044731","9783642044748"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04474-8_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}