{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T14:58:46Z","timestamp":1725634726923},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642252822"},{"type":"electronic","value":"9783642252839"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25283-9_20","type":"book-chapter","created":{"date-parts":[[2011,11,17]],"date-time":"2011-11-17T16:31:18Z","timestamp":1321547478000},"page":"302-315","source":"Crossref","is-referenced-by-count":1,"title":["Interoperable Remote Attestation for VPN Environments"],"prefix":"10.1007","author":[{"given":"Ingo","family":"Bente","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bastian","family":"Hellmann","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Joerg","family":"Vieweg","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Josef","family":"von Helden","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Arne","family":"Welzel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Baiardi, F., Sgandurra, D.: Attestation of integrity of overlay networks. Journal of Systems Architecture (2010) (in press) (corrected proof), \n                    \n                      http:\/\/www.sciencedirect.com\/science\/article\/B6V1F-508PPYT-1\/2\/59cabe0d98e91e12c75b03d76b270d9f"},{"key":"20_CR2","first-page":"132","volume-title":"CCS 2004: Proceedings of the 11th ACM Conference on Computer and Communications Security","author":"E. Brickell","year":"2004","unstructured":"Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: CCS 2004: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 132\u2013145. ACM, New York (2004)"},{"key":"20_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-540-30108-0_5","volume-title":"Computer Security \u2013 ESORICS 2004","author":"J. Camenisch","year":"2004","unstructured":"Camenisch, J.: Better privacy for trusted computing platforms. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol.\u00a03193, pp. 73\u201388. Springer, Heidelberg (2004)"},{"key":"20_CR4","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1179474.1179479","volume-title":"STC 2006: Proceedings of the First ACM Workshop on Scalable Trusted Computing","author":"L. Chen","year":"2006","unstructured":"Chen, L., Landfermann, R., L\u00f6hr, H., Rohe, M., Sadeghi, A.R., St\u00fcble, C.: A protocol for property-based attestation. In: STC 2006: Proceedings of the First ACM Workshop on Scalable Trusted Computing, pp. 7\u201316. ACM, New York (2006)"},{"key":"20_CR5","unstructured":"Netfilter and Iptables Project Homepage, \n                    \n                      http:\/\/www.netfilter.org\/\n                    \n                    \n                   (accessed on 2010\/08\/04)"},{"key":"20_CR6","unstructured":"Kaufman, C.: Internet key exchange (ikev2) protocol (2005), \n                    \n                      http:\/\/tools.ietf.org\/html\/rfc4306"},{"key":"20_CR7","unstructured":"Kent, S., Atkinson, R.: Security architecture for the internet protocol (1998), \n                    \n                      http:\/\/tools.ietf.org\/html\/rfc2401"},{"key":"20_CR8","unstructured":"libtnc Website, \n                    \n                      http:\/\/sourceforge.net\/projects\/libtnc\/\n                    \n                    \n                   (accessed on 2010\/08\/04)"},{"key":"20_CR9","unstructured":"Maughan, D., et al.: Internet security association and key management protocol (isakmp) (1998), \n                    \n                      http:\/\/tools.ietf.org\/html\/rfc2408"},{"key":"20_CR10","unstructured":"OpenVPN Website, \n                    \n                      http:\/\/openvpn.net\/\n                    \n                    \n                   (accessed on 2010\/08\/04)"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-642-00587-9_13","volume-title":"Trusted Computing","author":"S. Schulz","year":"2009","unstructured":"Schulz, S., Sadeghi, A.R.: Secure VPNs for trusted computing environments. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol.\u00a05471, pp. 197\u2013216. Springer, Heidelberg (2009)"},{"key":"20_CR12","series-title":"LNCS","volume-title":"Financial Cryptography","author":"S. Schulz","year":"2010","unstructured":"Schulz, S., Sadeghi, A.R.: Extending ipsec for efficient remote attestation. In: Sion, R. (ed.) Financial Cryptography. LNCS. Springer, Heidelberg (January 2010), Workshop on Real-Life Cryptographic Protocols (RLCPS)"},{"key":"20_CR13","unstructured":"TCG Infrastructure Work Group: Reference Architecture for Interoperability (Part I) (June 2005), \n                    \n                      http:\/\/www.trustedcomputinggroup.org\/resources\/infrastructure_work_group_reference_architecture_for_interoperability_specification_part_1_version_10\n                    \n                    \n                  , specification Version 1.0 Revision 1"},{"key":"20_CR14","unstructured":"TCG Infrastructure Working Group: Platform Trust Services Interface Specification (IF-PTS) (November 2006), \n                    \n                      http:\/\/www.trustedcomputinggroup.org\/files\/temp\/6427263A-1D09-3519-ADEE3EFF23C8F901\/IWG%20IF-PTS_v1.pdf\n                    \n                    \n                  , specification Version 1.0"},{"key":"20_CR15","unstructured":"TCG Trusted Network Connect Work Group: TNC IF-IMC (February 2007), \n                    \n                      http:\/\/www.trustedcomputinggroup.org\/resources\/tnc_ifimc_specification\n                    \n                    \n                  , specification Version 1.2 Revision 8"},{"key":"20_CR16","unstructured":"TCG Trusted Network Connect Work Group: TNC IF-IMV (February 2007), \n                    \n                      http:\/\/www.trustedcomputinggroup.org\/resources\/tnc_ifimv_specification\n                    \n                    \n                  , specification Version 1.2 Revision 8"},{"key":"20_CR17","unstructured":"TCG Trusted Network Connect Work Group: TNC Architecture for Interoperability (May 2009), \n                    \n                      http:\/\/www.trustedcomputinggroup.org\/resources\/tnc_architecture_for_interoperability_specification\n                    \n                    \n                  , specification Version 1.4 Revision 4"},{"key":"20_CR18","unstructured":"TCG Trusted Network Connect Working Group: TNC IF-PEP: Protocol Bindings for RADIUS (February 2007), \n                    \n                      http:\/\/www.trustedcomputinggroup.org\/files\/resource_files\/8CC5592B-1D09-3519-AD45F0F893766F6B\/TNC_IF-PEP_v1.1_rev_0.7.pdf\n                    \n                    \n                  , specification Version 1.1 Revision 0.7"},{"key":"20_CR19","unstructured":"TCG Trusted Platform Module Work Group: TPM Main Part 2 TPM Structures (October 2006), \n                    \n                      http:\/\/www.trustedcomputinggroup.org\/files\/resource_files\/E14876A3-1A4B-B294-D086297A1ED38F96\/mainP2Structrev103.pdf\n                    \n                    \n                  , specification Version 1.2 Level 2 Revision 103"},{"key":"20_CR20","unstructured":"TCG Trusted Platform Module Work Group: TPM Main Part 3 Commands (October 2006), \n                    \n                      http:\/\/www.trustedcomputinggroup.org\/files\/resource_files\/E14A09AD-1A4B-B294-D049ACC1A1A138ED\/mainP3Commandsrev103.pdf\n                    \n                    \n                  , specification Version 1.2 Level 2 Revision 103"},{"key":"20_CR21","unstructured":"TCG Trusted Platform Module Work Group: TPM Main Part 1 Design Principles (July 2007), \n                    \n                      http:\/\/www.trustedcomputinggroup.org\/files\/resource_files\/ACD19914-1D09-3519-ADA64741A1A15795\/mainP1DPrev103.zip\n                    \n                    \n                  , specification Version 1.2 Level 2 Revision 103"},{"key":"20_CR22","unstructured":"TNC at FHH Website, \n                    \n                      http:\/\/www.trust.inform.fh-hannover.de\/\n                    \n                    \n                   (accessed on 2010\/08\/04)"},{"key":"20_CR23","unstructured":"Trusted Computing Group: Glossary, \n                    \n                      http:\/\/www.trustedcomputinggroup.org\/developers\/glossary\/\n                    \n                    \n                   (accessed on 2010\/08\/06)"}],"container-title":["Lecture Notes in Computer Science","Trusted Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25283-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,18]],"date-time":"2019-04-18T18:00:43Z","timestamp":1555610443000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25283-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642252822","9783642252839"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25283-9_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}