{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:39:33Z","timestamp":1725899973388},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642138683"},{"type":"electronic","value":"9783642138690"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13869-0_9","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T07:24:20Z","timestamp":1277796260000},"page":"124-140","source":"Crossref","is-referenced-by-count":8,"title":["\u03bcTSS \u2013 A Simplified Trusted Software Stack"],"prefix":"10.1007","author":[{"given":"Christian","family":"St\u00fcble","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anoosheh","family":"Zaerin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Trusted\u00a0Computing Group. TPM main specification. Main Specification Version 1.2 rev. 103, Trusted Computing Group (July 2007)"},{"key":"9_CR2","unstructured":"Trusted Computing Group. Trusted network connect. Specification Version 1.2 (2007)"},{"key":"9_CR3","unstructured":"Trusted\u00a0Computing Group. TCG Software Stack specification. Version 1.2 (January 2006), \n                    \n                      http:\/\/trustedcomputinggroup.org"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"L\u00f6hr, H., Sadeghi, A.-R., St\u00fcble, C., Weber, M., Winandy, M.: Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels (2009)","DOI":"10.1007\/978-3-642-00587-9_4"},{"key":"9_CR5","unstructured":"Sadeghi, A.-R., St\u00fcble, C., Pohlmann, N.: European Multilateral Secure Computing Base - Open Trusted Computing for You and Me\u00a028(9), 548\u2013554 (2004)"},{"key":"9_CR6","unstructured":"Alkassar, A., Scheibel, M., Sadeghi, A.-R., St\u00fcble, C., Winandy, M.: Security Architecture for Device Encryption and VPN. In: Information Security Solution Europe (ISSE 2006). Vieweg Verlag (2006)"},{"key":"9_CR7","unstructured":"Microsoft. BitLocker drive encryption, \n                    \n                      http:\/\/www.microsoft.com\/windows\/windows-vista\/features\/bitlocker.aspx"},{"key":"9_CR8","unstructured":"Wave\u00a0Systems Corp. EMBASSY Trust Suite, \n                    \n                      http:\/\/www.wave.com\/products\/ets.asp"},{"key":"9_CR9","unstructured":"St\u00fcble, C., Zaerin, A.: The TPM Manager Software Architecture. Sirrix AG (2008)"},{"key":"9_CR10","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns. Addison-Wesley Professional Computing Series (1995)"},{"key":"9_CR11","unstructured":"Mobile Phone\u00a0Working Group. TCG Mobile Reference Architecture. Technical Report Version 1.0, Trusted Computing Group (June 2007)"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Gasmi, Y., Sadeghi, A.-R., Ramunno, G., Vernizzi, D., Stewin, P., Unger, M.: An Efficient Implementation of Trusted Channels based on OpenSSL. In: Proceedings of ACM STC 2008 (2008)","DOI":"10.1145\/1456455.1456462"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Schulz, S., Sadeghi, A.-R.: Extending IPsec for Efficient Remote Attestation. In: 14th International Conference on Financial Cryptography and Data Security, FC 2010 (2010)","DOI":"10.1007\/978-3-642-14992-4_14"},{"key":"9_CR14","unstructured":"Trusted\u00a0Computing Group. TCG Software Stack specification. Version 1.1 (August 2003), \n                    \n                      http:\/\/trustedcomputinggroup.org"},{"key":"9_CR15","unstructured":"Trusted Platform Agent - The open source library for Trusted Computing, \n                    \n                      http:\/\/security.polito.it\/tc\/tpa\/"},{"key":"9_CR16","unstructured":"IAIK jTSS - TCG Software Stack for the Java (tm) Platform, \n                    \n                      http:\/\/trustedjava.sourceforge.net\/"},{"key":"9_CR17","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/1655108.1655119","volume-title":"STC 2009: Proceedings of the 2009 ACM workshop on Scalable trusted computing","author":"R. Toegl","year":"2009","unstructured":"Toegl, R., Winkler, T., Nauman, M., Hong, T.: Towards platform-independent trusted computing. In: STC 2009: Proceedings of the 2009 ACM workshop on Scalable trusted computing, pp. 61\u201366. ACM, New York (2009)"},{"key":"9_CR18","unstructured":"TPM\/J Java-based API for the Trusted Platform Module (TPM), \n                    \n                      http:\/\/projects.csail.mit.edu\/tc\/tpmj\/"},{"key":"9_CR19","unstructured":"libtpm - a small, low-level TPM access library, \n                    \n                      http:\/\/domino.research.ibm.com\/comm\/research_projects.nsf\/pages\/gsal.TCG.html"},{"key":"9_CR20","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/1655108.1655111","volume-title":"STC 2009: Proceedings of the 2009 ACM workshop on Scalable Trusted Computing","author":"J.-E. Ekberg","year":"2009","unstructured":"Ekberg, J.-E., Bugiel, S.: Trust in a small package: minimized MRTM software implementation for mobile secure environments. In: STC 2009: Proceedings of the 2009 ACM workshop on Scalable Trusted Computing, pp. 9\u201318. ACM, New York (2009)"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13869-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T15:25:03Z","timestamp":1558279503000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13869-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642138683","9783642138690"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13869-0_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}