{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:59:47Z","timestamp":1725562787251},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642137389"},{"type":"electronic","value":"9783642137396"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13739-6_17","type":"book-chapter","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T11:23:50Z","timestamp":1282649030000},"page":"257-272","source":"Crossref","is-referenced-by-count":2,"title":["Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms"],"prefix":"10.1007","author":[{"given":"Aarthi","family":"Nagarajan","sequence":"first","affiliation":[]},{"given":"Vijay","family":"Varadharajan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Trusted Computing Group: TPM Main - Part 1 Design Principles, Version 1.2, Revision 103 (July 2007)"},{"key":"17_CR2","unstructured":"Poritz, J., Schunter, M., Herreweghen, E.V., Waidner, M.: Property attestation-Scalable and privacy-friendly security assessment of peer computers. Technical report, IBM Research (May 2004)"},{"key":"17_CR3","first-page":"67","volume-title":"NSPW 2004: Proceedings of the 2004 Workshop on New Security Paradigms","author":"A.R. Sadeghi","year":"2004","unstructured":"Sadeghi, A.R., St\u00fcble, C.: Property-based attestation for computing platforms: Caring about properties, not mechanisms. In: NSPW 2004: Proceedings of the 2004 Workshop on New Security Paradigms, USA, pp. 67\u201377. ACM, New York (2004)"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Nagarajan, A., Varadharajan, V., Gallery, E., Hitchens, M.: Property based attestation and trusted computing: Analysis and challenges. In: Third International Conference on Network and System Security, Gold Coast, Australia (October 2009)","DOI":"10.1109\/NSS.2009.83"},{"key":"17_CR5","unstructured":"Anonymous: Title Suppressed. PhD thesis (2010)"},{"issue":"3","key":"17_CR6","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"9","author":"A. J\u00f8sang","year":"2001","unstructured":"J\u00f8sang, A.: A logic for uncertain probabilities. Int. J. Uncertain. Fuzziness Knowl. Based Syst.\u00a09(3), 279\u2013311 (2001)","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"issue":"4","key":"17_CR7","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/COMST.2000.5340804","volume":"3","author":"Tyrone Grandison","year":"2000","unstructured":"Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys and Tutorials\u00a03(4) (2000)","journal-title":"IEEE Communications Surveys & Tutorials"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13739-6_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:42:31Z","timestamp":1606185751000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13739-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642137389","9783642137396"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13739-6_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}