{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T14:58:10Z","timestamp":1725634690985},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642252822"},{"type":"electronic","value":"9783642252839"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25283-9_4","type":"book-chapter","created":{"date-parts":[[2011,11,17]],"date-time":"2011-11-17T16:31:18Z","timestamp":1321547478000},"page":"47-66","source":"Crossref","is-referenced-by-count":1,"title":["An Abstract Model of a Trusted Platform"],"prefix":"10.1007","author":[{"given":"Cornelius","family":"Namiluko","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrew","family":"Martin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"4_CR1","volume-title":"Dynamics of a Trusted Platform: A Building Block Approach","author":"D. Grawrock","year":"2009","unstructured":"Grawrock, D.: Dynamics of a Trusted Platform: A Building Block Approach. Intel Press, Hillsboro (2009)"},{"key":"4_CR2","unstructured":"Cooper, A.: Towards a Trusted Grid Architecture. PhD thesis, Oxford University (2008)"},{"key":"4_CR3","unstructured":"L\u00f6hr, H., Ramasamy, H., Sadeghi, A.R., Schulz, S., Schunter, M., St\u00fcble, C.: Enhancing grid security using trusted virtualization (2007)"},{"key":"4_CR4","unstructured":"Santos, N., Gummadi, K.P., Rodrigues, R.: Towards trusted cloud computing. In: HOTCLOUD (2009)"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MC.2003.1212691","volume":"36","author":"P. England","year":"2003","unstructured":"England, P., Lampson, B., Manferdelli, J., Peinado, M., Willman, B.: A trusted open platform. Computer\u00a036, 55\u201362 (2003)","journal-title":"Computer"},{"key":"4_CR6","first-page":"373","volume-title":"CCGRID 2006: Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid","author":"A. Cooper","year":"2006","unstructured":"Cooper, A., Martin, A.: Towards a secure, tamper-proof grid platform. In: CCGRID 2006: Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid, pp. 373\u2013380. IEEE Computer Society, Washington, DC, USA (2006)"},{"key":"4_CR7","unstructured":"Challener, D., Yoder, K., Catherman, R., Safford, D., Van Doorn, L.: A practical guide to trusted computing. IBM Press (2007)"},{"key":"4_CR8","unstructured":"TCG: Trusted Platform Module (TPM) Specifiation (2008)"},{"key":"4_CR9","first-page":"67","volume-title":"NSPW 2004: Proceedings of the 2004 Workshop on New Security Paradigms","author":"A.R. Sadeghi","year":"2004","unstructured":"Sadeghi, A.R., St\u00fcble, C.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: NSPW 2004: Proceedings of the 2004 Workshop on New Security Paradigms, pp. 67\u201377. ACM, New York (2004)"},{"key":"4_CR10","first-page":"3","volume-title":"VM 2004: Proceedings of the 3rd Conference on Virtual Machine Research and Technology Symposium","author":"V. Haldar","year":"2004","unstructured":"Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation: a virtual machine directed approach to trusted computing. In: VM 2004: Proceedings of the 3rd Conference on Virtual Machine Research and Technology Symposium, p. 3. USENIX Association, Berkeley (2004)"},{"key":"4_CR11","first-page":"175","volume-title":"SACMAT 2008: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies","author":"M. Alam","year":"2008","unstructured":"Alam, M., Zhang, X., Nauman, M., Ali, T., Seifert, J.P.: Model-based behavioral attestation. In: SACMAT 2008: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, pp. 175\u2013184. ACM, New York (2008)"},{"issue":"8","key":"4_CR12","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1145\/359576.359585","volume":"21","author":"C.A.R. Hoare","year":"1978","unstructured":"Hoare, C.A.R.: Communicating sequential processes. Commun. ACM\u00a021(8), 666\u2013677 (1978)","journal-title":"Commun. ACM"},{"key":"4_CR13","volume-title":"The Theory and Practice of Concurrency","author":"A.W. Roscoe","year":"1997","unstructured":"Roscoe, A.W.: The Theory and Practice of Concurrency. Prentice Hall PTR, Upper Saddle River (1997)"},{"key":"4_CR14","volume-title":"Proceedings of 1995 IEEE Computer Security Foundations Workshop","author":"A.W. Roscoe","year":"1995","unstructured":"Roscoe, A.W.: Modelling and verifying key-exchange protocols using csp and fdr. In: Proceedings of 1995 IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos (1995)"},{"issue":"1-2","key":"4_CR15","doi-asserted-by":"publisher","first-page":"53","DOI":"10.3233\/JCS-1998-61-204","volume":"6","author":"G. Lowe","year":"1998","unstructured":"Lowe, G.: Casper: a compiler for the analysis of security protocols. J. Comput. Secur.\u00a06(1-2), 53\u201384 (1998)","journal-title":"J. Comput. Secur."},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Brock, N., Jackson, D.: Formal verification of a fault tolerant computer. In: Proceedings of IEEE\/AIAA 11th Digital Avionics Systems Conference, 1992, pp. 132\u2013137 (October 1992)","DOI":"10.1109\/DASC.1992.282170"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/3-540-40891-6_33","volume-title":"Computer Safety, Reliability, and Security","author":"T. Cichocki","year":"2000","unstructured":"Cichocki, T., G\u00f3rski, J.: Failure mode and effect analysis for safety-critical systems with software components. In: Koornneef, F., van der Meulen, M. (eds.) SAFECOMP 2000. LNCS, vol.\u00a01943, pp. 382\u2013394. Springer, Heidelberg (2000), doi:10.1007\/3-540-40891-6_33"},{"issue":"1","key":"4_CR18","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst.\u00a08(1), 18\u201336 (1990)","journal-title":"ACM Trans. Comput. Syst."},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Gong, L., Needham, R., Yahalom, R.: Reasoning about belief in cryptographic protocols. In: IEEE Symposium on Security and Privacy, p. 234 (1990)","DOI":"10.1109\/RISP.1990.63854"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Kailar, R., Gligor, V.: On belief evolution in authentication protocols. In: Proceedings of Computer Security Foundations Workshop IV, 1991, pp. 103\u2013116 (June 1991)","DOI":"10.1109\/CSFW.1991.151576"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Sufatrio, Y.R.: xtending ban logic for reasoning with modern pki-based protocols. In: Cao, J., Li, M., Wu, M.-Y., Chen, J. (eds.) NPC 2008. LNCS, vol.\u00a05245, pp. 190\u2013197. Springer, Heidelberg (2008)","DOI":"10.1109\/NPC.2008.86"},{"key":"4_CR22","first-page":"1","volume-title":"HOTSEC 2008: Proceedings of the 3rd Conference on Hot Topics in Security","author":"B. Parno","year":"2008","unstructured":"Parno, B.: Bootstrapping trust in a \u201dtrusted\u201d platform. In: HOTSEC 2008: Proceedings of the 3rd Conference on Hot Topics in Security, pp. 1\u20136. USENIX Association, Berkeley (2008)"},{"key":"4_CR23","unstructured":"Chen, S., Wen, Y., Zhao, H.: Formal analysis of secure bootstrap in trusted computing (2007)"},{"key":"4_CR24","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/SP.2009.16","volume-title":"SP 2009: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy","author":"A. Datta","year":"2009","unstructured":"Datta, A., Franklin, J., Garg, D., Kaynar, D.: A logic of secure systems and its application to trusted computing. In: SP 2009: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, pp. 221\u2013236. IEEE Computer Society, Washington, DC, USA (2009)"},{"key":"4_CR25","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.entcs.2007.03.024","volume":"186","author":"F. Martinelli","year":"2007","unstructured":"Martinelli, F., Petrocchi, M.: A uniform framework for security and trust modeling and analysis with crypto-ccs. Electronic Notes in Theoretical Computer Science\u00a0186, 85\u201399 (2007); Proceedings of the First Workshop in Information and Computer Security (ICS 2006)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"issue":"5","key":"4_CR26","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TKDE.2003.1232267","volume":"15","author":"Y. Deng","year":"2003","unstructured":"Deng, Y., Wang, J., Tsai, J.J.P., Beznosov, K.: An approach for modeling and analysis of security system architectures. IEEE Trans. on Knowl. and Data Eng.\u00a015(5), 1099\u20131119 (2003)","journal-title":"IEEE Trans. on Knowl. and Data Eng."}],"container-title":["Lecture Notes in Computer Science","Trusted Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25283-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,19]],"date-time":"2019-06-19T18:49:17Z","timestamp":1560970157000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25283-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642252822","9783642252839"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25283-9_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}