{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:39:47Z","timestamp":1725899987882},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642138683"},{"type":"electronic","value":"9783642138690"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13869-0_6","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T11:24:20Z","timestamp":1277810660000},"page":"78-94","source":"Crossref","is-referenced-by-count":10,"title":["Towards a Trusted Mobile Desktop"],"prefix":"10.1007","author":[{"given":"Marcel","family":"Selhorst","sequence":"first","affiliation":[]},{"given":"Christian","family":"St\u00fcble","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Feldmann","sequence":"additional","affiliation":[]},{"given":"Utz","family":"Gnaida","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Alkassar, A., Gnaida, U., Quirin, T.: MoTrust-TCG: Manipulationsschutz f\u00fcr mobile Signaturanwendungen mittels Trusted Computing. In: Sicherheit 2008, pp. 575\u2013580 (2008)"},{"key":"6_CR2","unstructured":"Alkassar, A., Husseiki, R.: Data Leakage Prevention in Trusted Virtual Domains. In: Pohlmann, N., Reimer, H., Schneider, W. (eds.) Information Security Solutions Europe (ISSE 2009). Vieweg + Teubner Verlag (2009)"},{"key":"6_CR3","unstructured":"Alkassar, A., Scheibel, M., Sadeghi, A.-R., St\u00fcble, C., Winandy, M.: Security architecture for device encryption and VPN. In: Information Security Solution Europe (ISSE 2006). Vieweg Verlag (2006)"},{"key":"6_CR4","unstructured":"Alves, T., Felton, D.: TrustZone: Integrated hardware and software security. Technical report, ARM (July 2004)"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Gasmi, Y., Sadeghi, A.-R., Ramunno, G., Vernizzi, D., Stewin, P., Unger, M.: An Efficient Implementation of Trusted Channels based on OpenSSL. In: Proceedings of ACM STC 2008 (2008)","DOI":"10.1145\/1456455.1456462"},{"key":"6_CR6","unstructured":"Azema, J., Fayad, G.: M-Shield: Mobile Security Technology: making wireless secure. Technical report, Texas Instruments (June 2008)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Basili, V., Perricone, B.: Software Errors and Complexity: An Empirical Investigation. Communications of the ACM, 42\u201352 (1984)","DOI":"10.1145\/69605.2085"},{"key":"6_CR8","unstructured":"Brygier, J., Fuchsen, R., Blasum, H.: PikeOS: Safe and Secure Virtualization in a Separation Microkernel. Technical report, Sysgo (September 2009)"},{"key":"6_CR9","unstructured":"Cheng, Z.: Mobile Malware: Threats and Prevention (2007), http:\/\/www.mcafee.com\/us\/local_content\/white_papers\/threat_center\/wp_malware_r2_en.pdf"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-642-00587-9_3","volume-title":"Trusted Computing","author":"K. Diedrich","year":"2009","unstructured":"Diedrich, K., Winter, J.: Implementation Aspects of Mobile and Embedded Trusted Computing. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol.\u00a05471, pp. 29\u201344. Springer, Heidelberg (2009)"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/1655108.1655111","volume-title":"STC 2009: Proceedings of the 2009 ACM workshop on Scalable Trusted Computing","author":"J.-E. Ekberg","year":"2009","unstructured":"Ekberg, J.-E., Bugiel, S.: Trust in a small package: minimized MRTM software implementation for mobile secure environments. In: STC 2009: Proceedings of the 2009 ACM workshop on Scalable Trusted Computing, pp. 9\u201318. ACM, New York (2009)"},{"issue":"4","key":"6_CR12","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/152399.152402","volume":"10","author":"J. Epstein","year":"1992","unstructured":"Epstein, J.: A bibliography of windowing systems and security. ACM SIGSAC Review\u00a010(4), 7\u201311 (1992)","journal-title":"ACM SIGSAC Review"},{"issue":"2","key":"6_CR13","doi-asserted-by":"crossref","first-page":"159","DOI":"10.3233\/JCS-1993-22-306","volume":"2","author":"J. Epstein","year":"1993","unstructured":"Epstein, J., McHugh, J., Orman, H., Pascale, R., Marmor-Squires, A., Danner, B., Martin, C.R., Branstad, M., Benson, G., Rothnie, D.: A high assurance window system prototype. Journal of Computer Security\u00a02(2), 159\u2013190 (1993)","journal-title":"Journal of Computer Security"},{"key":"6_CR14","volume-title":"21st Annual Computer Security Applications Conference","author":"N. Feske","year":"2005","unstructured":"Feske, N., Helmuth, C.: A nitpicker\u2019s guide to a minimal-complexity secure GUI. In: 21st Annual Computer Security Applications Conference. ACM, New York (2005)"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Fischer, T., Sadeghi, A.-R., Winandy, M.: A Pattern for Secure Graphical User Interface Systems. In: 3rd International Workshop on Secure Systems Methodologies Using Patterns (2009)","DOI":"10.1109\/DEXA.2009.76"},{"key":"6_CR16","unstructured":"Forler, C., K\u00e4\u00df, S.: D03.5 - Embedded TSS: Technical specification. Technical report, Trusted Embedded Computing (January 2009)"},{"key":"6_CR17","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1278901.1278904","volume":"4","author":"G. Heiser","year":"2007","unstructured":"Heiser, G., Elphinstone, K., Kuz, I., Klein, G., Petters, S.M.: Towards trustworthy computing systems: taking microkernels to the next level. ACM Operating Systems Review\u00a04, 3\u201311 (2007)","journal-title":"ACM Operating Systems Review"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Liedtke, J.: Towards real micro-kernels. Communications of the ACM\u00a039(9) (1996)","DOI":"10.1145\/234215.234473"},{"key":"6_CR19","unstructured":"Mobile Phone\u00a0Working Group. TCG Mobile Trusted Module Specification. Technical Report version 1.0, Trusted Computing Group (June 2008)"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B., Riordan, J., St\u00fcble, C., Waidner, M., Weber, A.: The PERSEUS system architecture. Technical Report RZ 3335 (#93381), IBM Research Division, Zurich Laboratory (April 2001)","DOI":"10.1007\/978-3-663-05918-9_1"},{"issue":"9","key":"6_CR21","first-page":"548","volume":"28","author":"A.-R. Sadeghi","year":"2004","unstructured":"Sadeghi, A.-R., St\u00fcble, C., Pohlmann, N.: European multilateral secure computing base - open trusted computing for you and me. Datenschutz und Datensicherheit DuD, Verlag Friedrich Vieweg & Sohn, Wiesbaden\u00a028(9), 548\u2013554 (2004)","journal-title":"Datenschutz und Datensicherheit DuD, Verlag Friedrich Vieweg & Sohn, Wiesbaden"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Schulz, S., Sadeghi, A.-R.: Extending IPsec for Efficient Remote Attestation. In: 14th International Conference on Financial Cryptography and Data Security, FC 2010 (2010)","DOI":"10.1007\/978-3-642-14992-4_14"},{"key":"6_CR23","unstructured":"Shapiro, J.S., Vanderburgh, J., Northup, E.: Design of the EROS trusted window system. In: Proceedings of the 13th USENIX Security Symposium, August 2004, USENIX (2004)"},{"key":"6_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/978-3-642-13869-0_9","volume-title":"TRUST 2010","author":"C. St\u00fcble","year":"2010","unstructured":"St\u00fcble, C., Zaerin, A.: \u03bcTSS - A Simplied Trusted Software Stack. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol.\u00a06101, pp. 124\u2013140. Springer, Heidelberg (2010)"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Trusted\u00a0Computing Group. TPM main specification. Main Specification Version 1.2 rev. 85, Trusted Computing Group (February 2005)","DOI":"10.1049\/PBPC006E_ch1"},{"key":"6_CR26","unstructured":"Trusted Computing Group. Trusted Network Connect. Specification Version 1.2 (2007)"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13869-0_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T19:51:53Z","timestamp":1685649113000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13869-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642138683","9783642138690"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13869-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}