{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:39:46Z","timestamp":1725899986739},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642138683"},{"type":"electronic","value":"9783642138690"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13869-0_18","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T07:24:20Z","timestamp":1277796260000},"page":"265-272","source":"Crossref","is-referenced-by-count":8,"title":["Dynamic Enforcement of Platform Integrity"],"prefix":"10.1007","author":[{"given":"Martin","family":"Pirker","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ronald","family":"Toegl","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael","family":"Gissing","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Advanced Micro Devices: AMD64 Virtualization: Secure Virtual Machine Architecture Reference Manual (May 2005)"},{"key":"18_CR2","volume-title":"Proceedings of the 1997 IEEE Symposium on Security and Privacy","author":"W.A. Arbaugh","year":"1997","unstructured":"Arbaugh, W.A., Farber, D.J., Smith, J.M.: A secure and reliable bootstrap architecture. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, vol.\u00a065. IEEE Computer Society, Los Alamitos (1997)"},{"key":"18_CR3","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/1067170.1067179","volume-title":"Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services","author":"R. C\u00e1ceres","year":"2005","unstructured":"C\u00e1ceres, R., Carter, C., Narayanaswami, C., Raghunath, M.: Reincarnating pcs with portable soulpads. In: Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, pp. 65\u201378. ACM, Seattle (2005)"},{"key":"18_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1655108.1655110","volume-title":"Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing","author":"C. Gebhardt","year":"2009","unstructured":"Gebhardt, C., Dalton, C.: Lala: a late launch application. In: Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing, pp. 1\u20138. ACM, Chicago (2009)"},{"key":"18_CR5","volume-title":"3rd Asia-Pacific Trusted Infrastructure Technologies Conference (APTC 2008)","author":"C. Gebhardt","year":"2008","unstructured":"Gebhardt, C., Tomlinson, A.: Secure Virtual Disk Images for Grid Computing. In: 3rd Asia-Pacific Trusted Infrastructure Technologies Conference (APTC 2008), October 2008. IEEE Computer Society, Los Alamitos (2008)"},{"key":"18_CR6","unstructured":"Grawrock, D.: Dynamics of a Trusted Platform: A Building Block Approach. No. ISBN 978-1934053171, Richard Bowles, Intel Press, Intel Corporation, 2111 NE 25th Avenue, JF3-330, Hillsboro, OR 97124-5961 (February 2009)"},{"key":"18_CR7","unstructured":"Intel Corporation: Intel active management technology (amt), \n                    \n                      http:\/\/www.intel.com\/technology\/platform-technology\/intel-amt\/index.htm"},{"key":"18_CR8","unstructured":"Intel Corporation: Trusted Boot - an open source, pre- kernel\/VMM module that uses Intel TXT to perform a measured and verified launch of an OS kernel\/VMM (2008), \n                    \n                      http:\/\/sourceforge.net\/projects\/tboot\/"},{"key":"18_CR9","unstructured":"Intel Corporation: Intel Trusted Execution Technology Software Development Guide (December 2009), \n                    \n                      http:\/\/download.intel.com\/technology\/security\/downloads\/315168.pdf"},{"key":"18_CR10","first-page":"1","volume-title":"SS 2007: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium","author":"B. Kauer","year":"2007","unstructured":"Kauer, B.: Oslo: improving the security of trusted computing. In: SS 2007: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pp. 1\u20139. USENIX Association, Berkeley (2007)"},{"key":"18_CR11","unstructured":"Marchesini, J., Smith, S., Wild, O., MacDonald, R.: Experimenting with tcpa\/tcg hardware, or: How i learned to stop worrying and love the bear. Tech. rep., Department of Computer Science\/Dartmouth PKI Lab, Dartmouth College (2003)"},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1145\/1352592.1352625","volume-title":"Proceedings of the 3rd ACM SIGOPS\/EuroSys European Conference on Computer Systems 2008","author":"J.M. McCune","year":"2008","unstructured":"McCune, J.M., Parno, B.J., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: an execution infrastructure for tcb minimization. In: Proceedings of the 3rd ACM SIGOPS\/EuroSys European Conference on Computer Systems 2008, pp. 315\u2013328. ACM, Glasgow (2008)"},{"key":"18_CR13","unstructured":"Pirker, M., Toegl, R., Winkler, T., Vejda, T.: Trusted computing for the JavaTMplatform (2009), \n                    \n                      http:\/\/trustedjava.sourceforge.net\/"},{"key":"18_CR14","unstructured":"Pirker, M., Toegl, R.: Towards a virtual trusted platform. Journal of Universal Computer Science (2010) (in print), \n                    \n                      http:\/\/www.jucs.org\/jucs_16_4\/towards_a_virtual_trusted"},{"key":"18_CR15","first-page":"2","volume":"112","author":"D. Safford","year":"2003","unstructured":"Safford, D., Kravitz, J., Doorn, L.v.: Take control of tcpa. Linux Journal\u00a0(112), 2 (2003), \n                    \n                      http:\/\/domino.research.ibm.com\/comm\/research_projects.nsf\/pages\/gsal.TCG.html","journal-title":"Linux Journal"},{"key":"18_CR16","volume-title":"Proceedings of the 13th USENIX Security Symposium","author":"R. Sailer","year":"2004","unstructured":"Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: Proceedings of the 13th USENIX Security Symposium. USENIX Association, San Diego (2004)"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Shi, E., Perrig, A., Van Doorn, L.: Bind: a fine-grained attestation service for secure distributed systems. In: 2005 IEEE Symposium on Security and Privacy, pp. 154\u2013168 (2005)","DOI":"10.1109\/SP.2005.4"},{"key":"18_CR18","unstructured":"Trusted Computing Group: TCG TPM specification version 1.2 revision 103 (2007), \n                    \n                      https:\/\/www.trustedcomputinggroup.org\/specs\/TPM\/"},{"key":"18_CR19","unstructured":"Tygar, J., Yee, B.: Dyad: A system for using physically secure coprocessors. In: Technological Strategies for the Protection of Intellectual Property in the Networked Multimedia Environment, pp. 121\u2013152. Interactive Multimedia Association (1994)"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13869-0_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T08:14:56Z","timestamp":1619770496000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13869-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642138683","9783642138690"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13869-0_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}