{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:39:55Z","timestamp":1725899995817},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642138683"},{"type":"electronic","value":"9783642138690"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13869-0_5","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T11:24:20Z","timestamp":1277810660000},"page":"63-77","source":"Crossref","is-referenced-by-count":7,"title":["Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation"],"prefix":"10.1007","author":[{"given":"Sami","family":"Alsouri","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"\u00d6zg\u00fcr","family":"Dagdelen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1145\/1030083.1030103","volume-title":"Proceedings of the 11th ACM Conference on Computer and Communications Security","author":"E. Brickell","year":"2004","unstructured":"Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington DC, USA, pp. 132\u2013145. ACM, New York (2004)"},{"key":"5_CR2","unstructured":"Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture. In: 13th USENIX Security Symposium, San Diego, CA, USA, August 2004, USENIX Association (2004)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Lyle, J., Martin, A.: On the feasibility of remote attestation for web services. In: 2009 International Conference on Computational Science and Engineering, Vancouver, BC, Canada, pp. 283\u2013288 (2009)","DOI":"10.1109\/CSE.2009.213"},{"key":"5_CR4","first-page":"67","volume-title":"Proceedings of the 2004 Workshop on New Security Paradigms","author":"A. Sadeghi","year":"2004","unstructured":"Sadeghi, A., St\u00fcble, C.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: Proceedings of the 2004 Workshop on New Security Paradigms, Nova Scotia, Canada, pp. 67\u201377. ACM, New York (2004)"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-68979-9_1","volume-title":"Trusted Computing - Challenges and Applications","author":"P. England","year":"2008","unstructured":"England, P.: Practical techniques for operating system attestation. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol.\u00a04968, pp. 1\u201313. Springer, Heidelberg (2008)"},{"key":"5_CR6","first-page":"143","volume-title":"Proceedings of the Network and Distributed System Security Symposium","author":"H. Krawczyk","year":"2000","unstructured":"Krawczyk, H., Rabin, T.: Chameleon hashing and signatures. In: Proceedings of the Network and Distributed System Security Symposium, pp. 143\u2013154. The Internet Society, San Diego (2000)"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/978-3-540-30598-9_12","volume-title":"Security in Communication Networks","author":"G. Ateniese","year":"2005","unstructured":"Ateniese, G., de Medeiros, B.: On the key exposure problem in chameleon hashes. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.\u00a03352, pp. 165\u2013179. Springer, Heidelberg (2005)"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"D. Chaum","year":"1991","unstructured":"Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 257\u2013265. Springer, Heidelberg (1991)"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","first-page":"644","volume-title":"EUROCRYPT 2003","author":"M. Bellare","year":"2003","unstructured":"Bellare, M., Micciancio, D., Warinschi, B.: Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, p. 644. Springer, Heidelberg (2003)"},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/1314333.1314337","volume-title":"Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society","author":"E. Brickell","year":"2007","unstructured":"Brickell, E., Li, J.: Enhanced privacy ID: a direct anonymous attestation scheme with enhanced revocation capabilities. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, Alexandria, Virginia, USA, pp. 21\u201330. ACM, New York (2007)"},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"2308","DOI":"10.1109\/ICYCS.2008.396","volume-title":"International Conference for Young Computer Scientists","author":"X. Chen","year":"2008","unstructured":"Chen, X., Feng, D.: A new direct anonymous attestation scheme from bilinear maps. In: International Conference for Young Computer Scientists, pp. 2308\u20132313. IEEE Computer Society, Los Alamitos (2008)"},{"key":"5_CR12","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1314354.1314368","volume-title":"STC 2007: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing","author":"U. K\u00fchn","year":"2007","unstructured":"K\u00fchn, U., Selhorst, M., St\u00fcble, C.: Realizing property-based attestation and sealing with commonly available hard- and software. In: STC 2007: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, pp. 50\u201357. ACM, New York (2007)"},{"key":"5_CR13","unstructured":"Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation: a virtual machine directed approach to trusted computing. In: Proceedings of the 3rd Conference on Virtual Machine Research And Technology Symposium, San Jose, California, vol.\u00a03, p. 3. USENIX Association (2004)"},{"key":"5_CR14","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1109\/ICWS.2005.136","volume-title":"Proceedings of the IEEE International Conference on Web Services","author":"S. Yoshihama","year":"2005","unstructured":"Yoshihama, S., Ebringer, T., Nakamura, M., Munetoh, S., Maruyama, H.: WS-Attestation: efficient and Fine-Grained remote attestation on web services. In: Proceedings of the IEEE International Conference on Web Services, pp. 743\u2013750. IEEE Computer Society, Los Alamitos (2005)"},{"key":"5_CR15","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/ICWS.2009.139","volume-title":"IEEE International Conference on Web Services","author":"M. Alam","year":"2009","unstructured":"Alam, M., Nauman, M., Zhang, X., Ali, T., Hung, P.C.: Behavioral attestation for business processes. In: IEEE International Conference on Web Services, pp. 343\u2013350. IEEE Computer Society, Los Alamitos (2009)"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/978-3-540-28628-8_3","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 41\u201355. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13869-0_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:14:59Z","timestamp":1619784899000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13869-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642138683","9783642138690"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13869-0_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}