{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:45:10Z","timestamp":1773409510456,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642138683","type":"print"},{"value":"9783642138690","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13869-0_14","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T11:24:20Z","timestamp":1277810660000},"page":"211-227","source":"Crossref","is-referenced-by-count":52,"title":["Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing"],"prefix":"10.1007","author":[{"given":"F. John","family":"Krautheim","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dhananjay S.","family":"Phatak","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alan T.","family":"Sherman","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"14_CR1","volume-title":"The Big Switch: Rewiring the World, from Edison to Google","author":"N.G. Carr","year":"2008","unstructured":"Carr, N.G.: The Big Switch: Rewiring the World, from Edison to Google. W.W. Norton & Company, New York (2008)"},{"key":"14_CR2","volume-title":"Above the Clouds: A Berkeley View of Cloud Computing","author":"M. Armbrust","year":"2009","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: Above the Clouds: A Berkeley View of Cloud Computing. University of California, Berkeley (2009), \n                    \n                      http:\/\/www.eecs.berkeley.edu\/Pubs\/TechRpts\/2009\/EECS-2009-28.pdf"},{"key":"14_CR3","doi-asserted-by":"crossref","DOI":"10.21236\/ADA545050","volume-title":"Private Virtual Infrastructure: A Model for Trustworthy Utility Cloud Computing. TR-CS-10-04","author":"F.J. Krautheim","year":"2010","unstructured":"Krautheim, F.J., Phatak, D.S., Sherman, A.T.: Private Virtual Infrastructure: A Model for Trustworthy Utility Cloud Computing. TR-CS-10-04. University of Maryland Baltimore County, Baltimore, MD (2010), \n                    \n                      http:\/\/www.cisa.umbc.edu\/papers\/krautheim_tr-cs-10-04.pdf"},{"key":"14_CR4","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1496091.1496100","volume":"39","author":"L.M. Vaquero","year":"2009","unstructured":"Vaquero, L.M., Rodero-Merino, L., Caceres, J., Lindner, M.: A Break in the Clouds: Towards a Cloud Definition. ACM SIGCOMM Computer Communication Review\u00a039, 50\u201355 (2009)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"14_CR5","volume-title":"The Intel Safer Computing Initiative","author":"D. Grawrock","year":"2006","unstructured":"Grawrock, D.: The Intel Safer Computing Initiative. Intel Press, Hillsboro (2006)"},{"key":"14_CR6","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-8348-9452-6_4","volume-title":"Trusted Computing","author":"V. Scarlata","year":"2008","unstructured":"Scarlata, V., Rozas, C., Wiseman, M., Grawrock, D., Vishik, C.: TPM Virtualization: Building a General Framework. In: Pohlmann, N., Reimer, H. (eds.) Trusted Computing, pp. 43\u201356. Vieweg+Teubner, Wiesbaden (2008)"},{"key":"14_CR7","unstructured":"Krautheim, F.J.: Private Virtual Infrastructure for Cloud Computing. In: Workshop on Hot Topics in Cloud Computing, San Diego, CA (2009)"},{"key":"14_CR8","unstructured":"TPM Specification Version 1.2 Revision 103. Trusted Computing Group (2007), \n                    \n                      http:\/\/www.trustedcomputinggroup.org\/resources\/tpm_main_specification"},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1535\/itj.1003.02","volume":"10","author":"D. Abramson","year":"2006","unstructured":"Abramson, D., Jackson, J., Muthrasanallur, S., Neiger, G., Regnier, G., Sankaran, R., Schoinas, I., Uhlig, R., Vembu, B., Wiegert, J.: Intel Virtualization Technology for Directed I\/O. Intel Technology Journal\u00a010, 179\u2013192 (2006)","journal-title":"Intel Technology Journal"},{"key":"14_CR10","unstructured":"Intel Trusted Execution Technology, \n                    \n                      http:\/\/www.intel.com\/technology\/security\/"},{"key":"14_CR11","unstructured":"Berger, S., C\u00e1ceres, R., Goldman, K.A., Perez, R., Sailer, R., van Doorn, L.: vTPM: Virtualizing the Trusted Platform Module. In: Proceedings of the 15th USENIX Security Symposium, Vancouver, BC (2006)"},{"key":"14_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-540-68979-9_9","volume-title":"Trusted Computing - Challenges and Applications","author":"P. England","year":"2008","unstructured":"England, P., Loeser, J.: Para-Virtualized TPM Sharing. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol.\u00a04968, pp. 119\u2013132. Springer, Heidelberg (2008)"},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1145\/1165389.945462","volume":"37","author":"P. Barham","year":"2003","unstructured":"Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the Art of Virtualization. ACM SIGOPS Operating Systems Review\u00a037, 164\u2013177 (2003)","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-85886-7_1","volume-title":"Information Security","author":"A.-R. Sadeghi","year":"2008","unstructured":"Sadeghi, A.-R., St\u00fcble, C., Winandy, M.: Property-Based TPM Virtualization. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol.\u00a05222, pp. 1\u201316. Springer, Heidelberg (2008)"},{"key":"14_CR15","unstructured":"Strasser, M.: A Software-based TPM Emulator for Linux. Department of Computer Science, Swiss Federal Institute of Technology, Zurich (2004)"},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","first-page":"17","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"X. Wang","year":"2005","unstructured":"Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 17\u201336. Springer, Heidelberg (2005)"},{"key":"14_CR17","unstructured":"Sailer, R., Valdez, E., Jaeger, T., Perez, R., van Doorn, L., Griffin, J.L., Berger, S.: sHype: Secure Hypervisor Approach to Trusted Virtualized Systems. IBM, Yorktown Heights, NY (2005), \n                    \n                      www.research.ibm.com\/secure_systems_department\/projects\/hypervisor\/"},{"key":"14_CR18","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-107","volume-title":"Recommendation for Applications Using Approved Hash Algorithms. NIST Special Publication","author":"Q. Dang","year":"2009","unstructured":"Dang, Q.: Recommendation for Applications Using Approved Hash Algorithms. NIST Special Publication, vol.\u00a0800. NIST, Gaithersburg (2009)"},{"key":"14_CR19","volume-title":"The Definitive Guide to the Xen Hypervisor","author":"D. Chisnall","year":"2008","unstructured":"Chisnall, D.: The Definitive Guide to the Xen Hypervisor. Prentice Hall, Upper Saddle River (2008)"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13869-0_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:14:55Z","timestamp":1619784895000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13869-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642138683","9783642138690"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13869-0_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}